General
-
Target
d7ea36398883213e96f72a1d47a4977fb344c2c6f77950071edde7e9b11155d5
-
Size
2.1MB
-
Sample
241010-cj55esvbmc
-
MD5
f251f53317f962043608f9fa95d536fd
-
SHA1
64ad9bab65b67a830d0f6a303fee168501775120
-
SHA256
d7ea36398883213e96f72a1d47a4977fb344c2c6f77950071edde7e9b11155d5
-
SHA512
0825d17b936e16719341501554da1bdd3b2c4cf4ed518de05eee6a2cfb19305404d07d15d1436aaec317066bceb1fb69cec562ab88abb5bb04657cc0083588fe
-
SSDEEP
24576:MSzz2BpQJE6JO5/OP7eaKzuj0D9s5YW1GhPIwtjVUTne0jBQFuo:MSmB8EhOySjE9suW1Gh7aTnHjBQwo
Static task
static1
Behavioral task
behavioral1
Sample
d7ea36398883213e96f72a1d47a4977fb344c2c6f77950071edde7e9b11155d5.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d7ea36398883213e96f72a1d47a4977fb344c2c6f77950071edde7e9b11155d5
-
Size
2.1MB
-
MD5
f251f53317f962043608f9fa95d536fd
-
SHA1
64ad9bab65b67a830d0f6a303fee168501775120
-
SHA256
d7ea36398883213e96f72a1d47a4977fb344c2c6f77950071edde7e9b11155d5
-
SHA512
0825d17b936e16719341501554da1bdd3b2c4cf4ed518de05eee6a2cfb19305404d07d15d1436aaec317066bceb1fb69cec562ab88abb5bb04657cc0083588fe
-
SSDEEP
24576:MSzz2BpQJE6JO5/OP7eaKzuj0D9s5YW1GhPIwtjVUTne0jBQFuo:MSmB8EhOySjE9suW1Gh7aTnHjBQwo
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5