General
-
Target
45256d2795ed176daa123d0fcba01fd9db920ee51c48efad6e4fd5ec52095e97
-
Size
362KB
-
Sample
220622-ag9nqafeer
-
MD5
af72abf808796389ef50276caee1c990
-
SHA1
f2ae9a2dd7aec1f154446968371d2c0241eeaa84
-
SHA256
45256d2795ed176daa123d0fcba01fd9db920ee51c48efad6e4fd5ec52095e97
-
SHA512
89883097c9a396b5b08a73603b2eb6da8f4cffcda9734af40e0e6097b710a04b1628ddc8af6f822fd79e3cba44ab9a518958ca54770f949bcb251ceddeaf3209
Static task
static1
Behavioral task
behavioral1
Sample
45256d2795ed176daa123d0fcba01fd9db920ee51c48efad6e4fd5ec52095e97.exe
Resource
win7-20220414-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
45256d2795ed176daa123d0fcba01fd9db920ee51c48efad6e4fd5ec52095e97
-
Size
362KB
-
MD5
af72abf808796389ef50276caee1c990
-
SHA1
f2ae9a2dd7aec1f154446968371d2c0241eeaa84
-
SHA256
45256d2795ed176daa123d0fcba01fd9db920ee51c48efad6e4fd5ec52095e97
-
SHA512
89883097c9a396b5b08a73603b2eb6da8f4cffcda9734af40e0e6097b710a04b1628ddc8af6f822fd79e3cba44ab9a518958ca54770f949bcb251ceddeaf3209
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-