General
-
Target
0e4bdbd55510bdbf7b2bd5b02d86ec4738300fd21ab3187e0a8f84dce3f399f4
-
Size
120KB
-
Sample
221011-f8j52agfep
-
MD5
60aa265746f1c97d91db609ed41f19d9
-
SHA1
4de9f34af9cb617bc0f0459dcfd14ed0305b7aa2
-
SHA256
0e4bdbd55510bdbf7b2bd5b02d86ec4738300fd21ab3187e0a8f84dce3f399f4
-
SHA512
9b2b320925b7342ff8ae6a105abc63a0e4f5070b42fa5f00ab5851c6a4c17120d84428e7e424353a3bde3854fd74cbae844d283a1e0e4e766d41830df45f95c5
-
SSDEEP
3072:Gm5Vy1ZsMce/KKwBrlqT2aOfMYTJDg8v6Um:xWnszePGrkTan
Static task
static1
Behavioral task
behavioral1
Sample
0e4bdbd55510bdbf7b2bd5b02d86ec4738300fd21ab3187e0a8f84dce3f399f4.dll
Resource
win7-20220812-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0e4bdbd55510bdbf7b2bd5b02d86ec4738300fd21ab3187e0a8f84dce3f399f4
-
Size
120KB
-
MD5
60aa265746f1c97d91db609ed41f19d9
-
SHA1
4de9f34af9cb617bc0f0459dcfd14ed0305b7aa2
-
SHA256
0e4bdbd55510bdbf7b2bd5b02d86ec4738300fd21ab3187e0a8f84dce3f399f4
-
SHA512
9b2b320925b7342ff8ae6a105abc63a0e4f5070b42fa5f00ab5851c6a4c17120d84428e7e424353a3bde3854fd74cbae844d283a1e0e4e766d41830df45f95c5
-
SSDEEP
3072:Gm5Vy1ZsMce/KKwBrlqT2aOfMYTJDg8v6Um:xWnszePGrkTan
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-