General
-
Target
0fb7a1ed47c9b63bfda1934e172bf6a2dbadbe3a26c94b18e698894b82d3f3c3
-
Size
190KB
-
Sample
221003-w71z6ababp
-
MD5
316b2696317ea8e9ae8e81ad605fa9f0
-
SHA1
76dce25ab8af40ad5a1285da1c88f36e9fba8447
-
SHA256
0fb7a1ed47c9b63bfda1934e172bf6a2dbadbe3a26c94b18e698894b82d3f3c3
-
SHA512
db3ea8c04b4136284a734599f83c472a57363d747e8a75c312dcb2dc5798384cfc64cc9cf2700419cbb105432867b668a5286224849638ff935baaf4c13a69a9
-
SSDEEP
3072:ScmVWLp5ltbmP3Q7ysD/u9wvPUPdjuOyMGiArkPZ+UcnHqpKuLi3e9Rw+AgjY:5mwSIf69aMPdj4ViE8ZLcHqU9kxjY
Static task
static1
Behavioral task
behavioral1
Sample
0fb7a1ed47c9b63bfda1934e172bf6a2dbadbe3a26c94b18e698894b82d3f3c3.exe
Resource
win7-20220812-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
0fb7a1ed47c9b63bfda1934e172bf6a2dbadbe3a26c94b18e698894b82d3f3c3
-
Size
190KB
-
MD5
316b2696317ea8e9ae8e81ad605fa9f0
-
SHA1
76dce25ab8af40ad5a1285da1c88f36e9fba8447
-
SHA256
0fb7a1ed47c9b63bfda1934e172bf6a2dbadbe3a26c94b18e698894b82d3f3c3
-
SHA512
db3ea8c04b4136284a734599f83c472a57363d747e8a75c312dcb2dc5798384cfc64cc9cf2700419cbb105432867b668a5286224849638ff935baaf4c13a69a9
-
SSDEEP
3072:ScmVWLp5ltbmP3Q7ysD/u9wvPUPdjuOyMGiArkPZ+UcnHqpKuLi3e9Rw+AgjY:5mwSIf69aMPdj4ViE8ZLcHqU9kxjY
-
Modifies firewall policy service
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-