General
-
Target
21088b0b1c5e6d7eec54fc21e969aee6a1818849094d89d215d7a99596f7c28e
-
Size
120KB
-
Sample
221020-amsbmaeec9
-
MD5
911f17f27a87741be1b0a26f8f3ac49c
-
SHA1
f41f4e28c711bb0f9f771f078614a048e460c79c
-
SHA256
21088b0b1c5e6d7eec54fc21e969aee6a1818849094d89d215d7a99596f7c28e
-
SHA512
363a3b8c24c1b83b2a920b15e23979ab1a5576c57d64d98daeadcee67b36dbf3bd70347d8f44866ccbce13b2693779322e1e4795c9d988ca3eed6f4592e30f7e
-
SSDEEP
3072:KS8gDju0Q2HeDpr4uiEbhMIKOZvqfm9oO:NO0BeDuuiYZJEfaoO
Static task
static1
Behavioral task
behavioral1
Sample
21088b0b1c5e6d7eec54fc21e969aee6a1818849094d89d215d7a99596f7c28e.dll
Resource
win7-20220812-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
21088b0b1c5e6d7eec54fc21e969aee6a1818849094d89d215d7a99596f7c28e
-
Size
120KB
-
MD5
911f17f27a87741be1b0a26f8f3ac49c
-
SHA1
f41f4e28c711bb0f9f771f078614a048e460c79c
-
SHA256
21088b0b1c5e6d7eec54fc21e969aee6a1818849094d89d215d7a99596f7c28e
-
SHA512
363a3b8c24c1b83b2a920b15e23979ab1a5576c57d64d98daeadcee67b36dbf3bd70347d8f44866ccbce13b2693779322e1e4795c9d988ca3eed6f4592e30f7e
-
SSDEEP
3072:KS8gDju0Q2HeDpr4uiEbhMIKOZvqfm9oO:NO0BeDuuiYZJEfaoO
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-