General
-
Target
5d50275044fd8b386adadf588533c1111e9f7d576ff8ad5e6dd88e315eff87c1
-
Size
6.7MB
-
Sample
220625-fh2x6ahbf3
-
MD5
d5802c702965338ba76f57e30fae3519
-
SHA1
8eb32737b7a1c2950da16411cb346abb8a5bdbca
-
SHA256
5d50275044fd8b386adadf588533c1111e9f7d576ff8ad5e6dd88e315eff87c1
-
SHA512
57188a9a99352a9243307b3803ce06c2ecf6cd792e26549e7448706ceeccc0e9d8067654b717ebcd07316915dc1bd80671f0fc2c79e4487e5cb2a926a9fec171
Static task
static1
Behavioral task
behavioral1
Sample
5d50275044fd8b386adadf588533c1111e9f7d576ff8ad5e6dd88e315eff87c1.exe
Resource
win7-20220414-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
5d50275044fd8b386adadf588533c1111e9f7d576ff8ad5e6dd88e315eff87c1
-
Size
6.7MB
-
MD5
d5802c702965338ba76f57e30fae3519
-
SHA1
8eb32737b7a1c2950da16411cb346abb8a5bdbca
-
SHA256
5d50275044fd8b386adadf588533c1111e9f7d576ff8ad5e6dd88e315eff87c1
-
SHA512
57188a9a99352a9243307b3803ce06c2ecf6cd792e26549e7448706ceeccc0e9d8067654b717ebcd07316915dc1bd80671f0fc2c79e4487e5cb2a926a9fec171
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-