General
-
Target
9368a238db47344ebb99f839530202cbf8fc0a4e33d11e4dd4db20655f10b19d
-
Size
65KB
-
Sample
240930-ag3keaxdjm
-
MD5
7a447d6a2ef82bb66881bb860da8e257
-
SHA1
cc06df890a50a7b2749f7ebd379994cb8b7c4612
-
SHA256
9368a238db47344ebb99f839530202cbf8fc0a4e33d11e4dd4db20655f10b19d
-
SHA512
a9ceb7153a145297dcdd3e0a8a237038b531404a454a971f2a464cec9af522b25dc7bb29c3d639f09d66da55dc1285ed91be33557f3d47c866797b62673d5d98
-
SSDEEP
1536:0vhoLL3JxxmPDtb1MbtUQi6/qjEgzUxpTKQhjz6Qg4:SivbxWp1MG2zgzoRKQhjzc4
Static task
static1
Behavioral task
behavioral1
Sample
9368a238db47344ebb99f839530202cbf8fc0a4e33d11e4dd4db20655f10b19d.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9368a238db47344ebb99f839530202cbf8fc0a4e33d11e4dd4db20655f10b19d
-
Size
65KB
-
MD5
7a447d6a2ef82bb66881bb860da8e257
-
SHA1
cc06df890a50a7b2749f7ebd379994cb8b7c4612
-
SHA256
9368a238db47344ebb99f839530202cbf8fc0a4e33d11e4dd4db20655f10b19d
-
SHA512
a9ceb7153a145297dcdd3e0a8a237038b531404a454a971f2a464cec9af522b25dc7bb29c3d639f09d66da55dc1285ed91be33557f3d47c866797b62673d5d98
-
SSDEEP
1536:0vhoLL3JxxmPDtb1MbtUQi6/qjEgzUxpTKQhjz6Qg4:SivbxWp1MG2zgzoRKQhjzc4
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5