General
-
Target
e3a3d0a090ea13afda381669223edebc4f0d367ec061d2de9e7b39e49752bbc0
-
Size
100KB
-
Sample
220701-grg5safabk
-
MD5
3eaa290fe7cc7975e7d888e35953b6ae
-
SHA1
c02af54f0a6c2bce354a5dd3cf62de3b25a0f7c4
-
SHA256
e3a3d0a090ea13afda381669223edebc4f0d367ec061d2de9e7b39e49752bbc0
-
SHA512
e53f4411b8d141835e48c25cf639963a48567a871b762bc27572b59eab8ecf35b28d75ff174c54cb6669996f2f7c237684100074d06c7b033afcbdbf06bab434
Static task
static1
Behavioral task
behavioral1
Sample
e3a3d0a090ea13afda381669223edebc4f0d367ec061d2de9e7b39e49752bbc0.exe
Resource
win7-20220414-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
e3a3d0a090ea13afda381669223edebc4f0d367ec061d2de9e7b39e49752bbc0
-
Size
100KB
-
MD5
3eaa290fe7cc7975e7d888e35953b6ae
-
SHA1
c02af54f0a6c2bce354a5dd3cf62de3b25a0f7c4
-
SHA256
e3a3d0a090ea13afda381669223edebc4f0d367ec061d2de9e7b39e49752bbc0
-
SHA512
e53f4411b8d141835e48c25cf639963a48567a871b762bc27572b59eab8ecf35b28d75ff174c54cb6669996f2f7c237684100074d06c7b033afcbdbf06bab434
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-