General
-
Target
50980d403e6a681e4e20926c593bfd0b287f7a87a69001ad668887ee5b41fb76
-
Size
100KB
-
Sample
221014-nml2hadcc3
-
MD5
6a65292bf9c00d3702ead026d9fe1d12
-
SHA1
8fecdc86cae3c389d8ab3d085b9f06b750b4b6c8
-
SHA256
50980d403e6a681e4e20926c593bfd0b287f7a87a69001ad668887ee5b41fb76
-
SHA512
b632dca5b97fcb67d8b7bf9f939de7ead118d718f4f337bd0cd8dd93c038c08309b3ed4ef8d65abb9900c6c53ef28ac8c3165c1d412069f1ae7e6748add1c443
-
SSDEEP
1536:RooGCXEHWk/bfKlgMvkEyGHi9g7iNOXfEsrBfheAcb7bLxPxexJsk:yoO2k/bilgMvkE7CnNKfxZlMb9w
Static task
static1
Behavioral task
behavioral1
Sample
50980d403e6a681e4e20926c593bfd0b287f7a87a69001ad668887ee5b41fb76.exe
Resource
win7-20220812-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
50980d403e6a681e4e20926c593bfd0b287f7a87a69001ad668887ee5b41fb76
-
Size
100KB
-
MD5
6a65292bf9c00d3702ead026d9fe1d12
-
SHA1
8fecdc86cae3c389d8ab3d085b9f06b750b4b6c8
-
SHA256
50980d403e6a681e4e20926c593bfd0b287f7a87a69001ad668887ee5b41fb76
-
SHA512
b632dca5b97fcb67d8b7bf9f939de7ead118d718f4f337bd0cd8dd93c038c08309b3ed4ef8d65abb9900c6c53ef28ac8c3165c1d412069f1ae7e6748add1c443
-
SSDEEP
1536:RooGCXEHWk/bfKlgMvkEyGHi9g7iNOXfEsrBfheAcb7bLxPxexJsk:yoO2k/bilgMvkE7CnNKfxZlMb9w
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-