General
-
Target
18db00c7c60b49231897a015e58a69e1097c4932fc8965732a966fa6972e11cf
-
Size
353KB
-
Sample
220608-s9sj1sabc5
-
MD5
0e3c9034d006c1116c6d3a0c28e66421
-
SHA1
cd2ad55741f2e60153e1fa2cff60b42735e1459a
-
SHA256
18db00c7c60b49231897a015e58a69e1097c4932fc8965732a966fa6972e11cf
-
SHA512
facad30648a0fd6fecf89d39be5ff991718940431cb4f370bff5cf9213de5d116a35f88e590d5d64f6ff2fe48fa5cd330b0f5b63252572b3776adea85bfbec04
Static task
static1
Behavioral task
behavioral1
Sample
18db00c7c60b49231897a015e58a69e1097c4932fc8965732a966fa6972e11cf.exe
Resource
win7-20220414-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
18db00c7c60b49231897a015e58a69e1097c4932fc8965732a966fa6972e11cf
-
Size
353KB
-
MD5
0e3c9034d006c1116c6d3a0c28e66421
-
SHA1
cd2ad55741f2e60153e1fa2cff60b42735e1459a
-
SHA256
18db00c7c60b49231897a015e58a69e1097c4932fc8965732a966fa6972e11cf
-
SHA512
facad30648a0fd6fecf89d39be5ff991718940431cb4f370bff5cf9213de5d116a35f88e590d5d64f6ff2fe48fa5cd330b0f5b63252572b3776adea85bfbec04
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-