General
-
Target
eb5b471fe10c81ea6f644dc3230ddf3fe094c82d3858c8d9806cb45de78f10d2N
-
Size
97KB
-
Sample
241008-3xpygazgmm
-
MD5
ece496c403318e9f02cdb676a295aa20
-
SHA1
c3fce76067409c458cd5f6ab5766440067f5c725
-
SHA256
eb5b471fe10c81ea6f644dc3230ddf3fe094c82d3858c8d9806cb45de78f10d2
-
SHA512
4ff685b64dc5ce53da9041851cfa69479c1922b7d15f2bca1afcecd6ff001434a647ec850fc68887fdc76573c6ee52300f6adf09b7902ad58bda9650bf122222
-
SSDEEP
3072:lCNaXroxGMcU4lAKCX0GLf/L3oaLnopgDiInfjiuf:DXdMcllAKCXVL3oarigDiYm
Static task
static1
Behavioral task
behavioral1
Sample
eb5b471fe10c81ea6f644dc3230ddf3fe094c82d3858c8d9806cb45de78f10d2N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
eb5b471fe10c81ea6f644dc3230ddf3fe094c82d3858c8d9806cb45de78f10d2N
-
Size
97KB
-
MD5
ece496c403318e9f02cdb676a295aa20
-
SHA1
c3fce76067409c458cd5f6ab5766440067f5c725
-
SHA256
eb5b471fe10c81ea6f644dc3230ddf3fe094c82d3858c8d9806cb45de78f10d2
-
SHA512
4ff685b64dc5ce53da9041851cfa69479c1922b7d15f2bca1afcecd6ff001434a647ec850fc68887fdc76573c6ee52300f6adf09b7902ad58bda9650bf122222
-
SSDEEP
3072:lCNaXroxGMcU4lAKCX0GLf/L3oaLnopgDiInfjiuf:DXdMcllAKCXVL3oarigDiYm
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5