General
-
Target
62165313bf501cb95da7062aed22bd547a6e2fe342154ba2f8a970b39f8454b2N
-
Size
97KB
-
Sample
241012-nrywvsycle
-
MD5
4842a4874bc232d3d2d76e496915d110
-
SHA1
5f2280c527ccb37e91edcc2d6952f7d5f5134e6e
-
SHA256
62165313bf501cb95da7062aed22bd547a6e2fe342154ba2f8a970b39f8454b2
-
SHA512
840c3864e34de2128d6f6130c9f9f3e1b6bd39f559c73a572c1ca0ea45376099cf8a44ddc8eb1e8d4d6c3133b16ee4eebfa6767d63301ce138a866c6706d8ce0
-
SSDEEP
3072:NL+HnvTMEdozX5Y0WgvjtKXWkIQ7jkhlt:h+HnvT7ozpYCvjtCvh7O
Static task
static1
Behavioral task
behavioral1
Sample
62165313bf501cb95da7062aed22bd547a6e2fe342154ba2f8a970b39f8454b2N.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
62165313bf501cb95da7062aed22bd547a6e2fe342154ba2f8a970b39f8454b2N
-
Size
97KB
-
MD5
4842a4874bc232d3d2d76e496915d110
-
SHA1
5f2280c527ccb37e91edcc2d6952f7d5f5134e6e
-
SHA256
62165313bf501cb95da7062aed22bd547a6e2fe342154ba2f8a970b39f8454b2
-
SHA512
840c3864e34de2128d6f6130c9f9f3e1b6bd39f559c73a572c1ca0ea45376099cf8a44ddc8eb1e8d4d6c3133b16ee4eebfa6767d63301ce138a866c6706d8ce0
-
SSDEEP
3072:NL+HnvTMEdozX5Y0WgvjtKXWkIQ7jkhlt:h+HnvT7ozpYCvjtCvh7O
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5