General
-
Target
2f0b311adadbc45db69d91484e4010884655d2d1443502d9e5a6d3ddd56b6a98
-
Size
338KB
-
Sample
220622-ag999aaca5
-
MD5
eed4ae179c3a0cf080781eb662d9936c
-
SHA1
68fbcb4d8cbbee423f9274a4b9c0c242f86701a0
-
SHA256
2f0b311adadbc45db69d91484e4010884655d2d1443502d9e5a6d3ddd56b6a98
-
SHA512
a52d91b844eea9e54fedc60bc8176290097bb181baea774fd37ba2692ec7e8e7be335a0c73bda6e32917a9486d97f768ef4461a78164ef464dc61f7bead6dedd
Static task
static1
Behavioral task
behavioral1
Sample
45256D2795ED176DAA123D0FCBA01FD9DB920EE51C48EFAD6E4FD5EC52095E97.exe
Resource
win7-20220414-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
45256D2795ED176DAA123D0FCBA01FD9DB920EE51C48EFAD6E4FD5EC52095E97
-
Size
362KB
-
MD5
af72abf808796389ef50276caee1c990
-
SHA1
f2ae9a2dd7aec1f154446968371d2c0241eeaa84
-
SHA256
45256d2795ed176daa123d0fcba01fd9db920ee51c48efad6e4fd5ec52095e97
-
SHA512
89883097c9a396b5b08a73603b2eb6da8f4cffcda9734af40e0e6097b710a04b1628ddc8af6f822fd79e3cba44ab9a518958ca54770f949bcb251ceddeaf3209
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-