General
-
Target
44740f07cd083cce4885c21c2014650071f96cc624635706724a57cda0c7528b
-
Size
492KB
-
Sample
220707-xxpd2sada4
-
MD5
4cc235735c222e44108d77cc78e6c9a6
-
SHA1
ac229bd71b6c637183a22c0c5e33b9af1e7095f0
-
SHA256
44740f07cd083cce4885c21c2014650071f96cc624635706724a57cda0c7528b
-
SHA512
defe9d930b8e5a0e8b9968b62c1c9baee9502be0ea46f0236e0c975cd5a37a61f11b6df58377029629bb64de686a780304ac2b67f2443bcdd4aa5cf65f52f8f3
Static task
static1
Behavioral task
behavioral1
Sample
44740f07cd083cce4885c21c2014650071f96cc624635706724a57cda0c7528b.exe
Resource
win7-20220414-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
44740f07cd083cce4885c21c2014650071f96cc624635706724a57cda0c7528b
-
Size
492KB
-
MD5
4cc235735c222e44108d77cc78e6c9a6
-
SHA1
ac229bd71b6c637183a22c0c5e33b9af1e7095f0
-
SHA256
44740f07cd083cce4885c21c2014650071f96cc624635706724a57cda0c7528b
-
SHA512
defe9d930b8e5a0e8b9968b62c1c9baee9502be0ea46f0236e0c975cd5a37a61f11b6df58377029629bb64de686a780304ac2b67f2443bcdd4aa5cf65f52f8f3
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-