General
-
Target
244e8393a3120b4321065dcf4c5a0671e3f68ca5bc6e6dcd5983ded59bd8b09c
-
Size
655KB
-
Sample
220611-2nz7eabebr
-
MD5
8a51d93fa4038e8610062d1b9833b101
-
SHA1
7fb6cf45a1f6cb8e764ec1fa7ee16f3494e874e6
-
SHA256
244e8393a3120b4321065dcf4c5a0671e3f68ca5bc6e6dcd5983ded59bd8b09c
-
SHA512
e18020a37f5e9e4f71b0ceaea14d248ebad45145f7a3cd7f2e1fc3ac57af3022e35f2bead57266b937da33c6f8381bb36d2b9b9dd81a6e12172c4757ee3ccff2
Static task
static1
Behavioral task
behavioral1
Sample
244e8393a3120b4321065dcf4c5a0671e3f68ca5bc6e6dcd5983ded59bd8b09c.exe
Resource
win7-20220414-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
244e8393a3120b4321065dcf4c5a0671e3f68ca5bc6e6dcd5983ded59bd8b09c
-
Size
655KB
-
MD5
8a51d93fa4038e8610062d1b9833b101
-
SHA1
7fb6cf45a1f6cb8e764ec1fa7ee16f3494e874e6
-
SHA256
244e8393a3120b4321065dcf4c5a0671e3f68ca5bc6e6dcd5983ded59bd8b09c
-
SHA512
e18020a37f5e9e4f71b0ceaea14d248ebad45145f7a3cd7f2e1fc3ac57af3022e35f2bead57266b937da33c6f8381bb36d2b9b9dd81a6e12172c4757ee3ccff2
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-