General
-
Target
6782415b0e4cfb21a7656bb5d1844a6bddc93e6e134d6c58add8eae156cf2be5
-
Size
266KB
-
Sample
220701-gjdgmaefcn
-
MD5
4b34ea2ad4316f0f2986ea34b62dee76
-
SHA1
cb397bdd16f9dc7eae8a65c082227fe44c169d54
-
SHA256
6782415b0e4cfb21a7656bb5d1844a6bddc93e6e134d6c58add8eae156cf2be5
-
SHA512
86ab65947681dcc75c39070e4fdfa47b6c25f76b2b5154318397cf03738bb2bb7853e6693388b4af83fbc25d8cf45845df7761a174504d4a225996bded7dd2b9
Static task
static1
Behavioral task
behavioral1
Sample
6782415b0e4cfb21a7656bb5d1844a6bddc93e6e134d6c58add8eae156cf2be5.exe
Resource
win7-20220414-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6782415b0e4cfb21a7656bb5d1844a6bddc93e6e134d6c58add8eae156cf2be5
-
Size
266KB
-
MD5
4b34ea2ad4316f0f2986ea34b62dee76
-
SHA1
cb397bdd16f9dc7eae8a65c082227fe44c169d54
-
SHA256
6782415b0e4cfb21a7656bb5d1844a6bddc93e6e134d6c58add8eae156cf2be5
-
SHA512
86ab65947681dcc75c39070e4fdfa47b6c25f76b2b5154318397cf03738bb2bb7853e6693388b4af83fbc25d8cf45845df7761a174504d4a225996bded7dd2b9
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-