General
-
Target
5a49633d37ee01c00f9e1dc942e755b043504e49075251eca62e843c80206cfa
-
Size
805KB
-
Sample
240829-kam69a1gja
-
MD5
22da16e720683be66aa35b8b791bd851
-
SHA1
f24b6c40272627a223305262cd5a83181a52c34f
-
SHA256
5a49633d37ee01c00f9e1dc942e755b043504e49075251eca62e843c80206cfa
-
SHA512
74322aa8227707f5733b6ab6fd0ba92a7d7957036c871b3c0846289e89f036bda8e965c454810894058e38dec0e4f5a8f0b51706c6c9cf6e10a2360adffd845d
-
SSDEEP
12288:CoQGca30phJbK1iutJUlQIr1QXPdszwp47xyQwXOs5Y2xxujukJOJdA:BYtbK1hJU18oJ77wf5rxx4+dA
Behavioral task
behavioral1
Sample
5a49633d37ee01c00f9e1dc942e755b043504e49075251eca62e843c80206cfa.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5a49633d37ee01c00f9e1dc942e755b043504e49075251eca62e843c80206cfa
-
Size
805KB
-
MD5
22da16e720683be66aa35b8b791bd851
-
SHA1
f24b6c40272627a223305262cd5a83181a52c34f
-
SHA256
5a49633d37ee01c00f9e1dc942e755b043504e49075251eca62e843c80206cfa
-
SHA512
74322aa8227707f5733b6ab6fd0ba92a7d7957036c871b3c0846289e89f036bda8e965c454810894058e38dec0e4f5a8f0b51706c6c9cf6e10a2360adffd845d
-
SSDEEP
12288:CoQGca30phJbK1iutJUlQIr1QXPdszwp47xyQwXOs5Y2xxujukJOJdA:BYtbK1hJU18oJ77wf5rxx4+dA
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5