General
-
Target
65f488a5578d9f63394afae589a47f91319480d01403f4ac953e909f85d7f83d
-
Size
374KB
-
Sample
220625-byxadshaer
-
MD5
49494f9afc67ffc0921da667106ad647
-
SHA1
be03bfa21772f1610dbd99c35a370eb4a642b909
-
SHA256
65f488a5578d9f63394afae589a47f91319480d01403f4ac953e909f85d7f83d
-
SHA512
8be5af264696e1c786777cc1d7581f6465915f6a21e90caab7d229149a495843482d90bb728a8e54459f7805e74b460db17dd9af7d291d9afa4c9e5e19d7b369
Static task
static1
Behavioral task
behavioral1
Sample
65f488a5578d9f63394afae589a47f91319480d01403f4ac953e909f85d7f83d.exe
Resource
win7-20220414-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
65f488a5578d9f63394afae589a47f91319480d01403f4ac953e909f85d7f83d
-
Size
374KB
-
MD5
49494f9afc67ffc0921da667106ad647
-
SHA1
be03bfa21772f1610dbd99c35a370eb4a642b909
-
SHA256
65f488a5578d9f63394afae589a47f91319480d01403f4ac953e909f85d7f83d
-
SHA512
8be5af264696e1c786777cc1d7581f6465915f6a21e90caab7d229149a495843482d90bb728a8e54459f7805e74b460db17dd9af7d291d9afa4c9e5e19d7b369
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-