General
-
Target
ScriptCryptor.exe
-
Size
528KB
-
Sample
220211-kcsjraeagm
-
MD5
55215f0ef9972f69b60f3f21a27a07d0
-
SHA1
3fd5fb6f8bcd8fa33604a24ae0c856d451fba539
-
SHA256
6d8d2c284235cac81763ee58e196b2f0b1e865cf192de04a64a4c3ecb350c85c
-
SHA512
3367a528ec827b0d28c748c8e5304d883586685cf1dccf6abce095db01e3d36f16f486c0fd21984ca7e593c4e4962dee4dc71f0fa4eeb097d8e1972c559e9e6d
Static task
static1
Behavioral task
behavioral1
Sample
ScriptCryptor.exe
Resource
win7-en-20211208
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
ScriptCryptor.exe
-
Size
528KB
-
MD5
55215f0ef9972f69b60f3f21a27a07d0
-
SHA1
3fd5fb6f8bcd8fa33604a24ae0c856d451fba539
-
SHA256
6d8d2c284235cac81763ee58e196b2f0b1e865cf192de04a64a4c3ecb350c85c
-
SHA512
3367a528ec827b0d28c748c8e5304d883586685cf1dccf6abce095db01e3d36f16f486c0fd21984ca7e593c4e4962dee4dc71f0fa4eeb097d8e1972c559e9e6d
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-