General
-
Target
0aa1943f8b95c5cb44bac6ca2f4a3a12d805cb96c5d9debc70d6dd534cb2d0d0
-
Size
643KB
-
Sample
221020-dhkmrsbfbl
-
MD5
8039b4cdf152123c603b7803aae59f30
-
SHA1
6f8389873918390b7789baee6f2fbd1a85b43b00
-
SHA256
0aa1943f8b95c5cb44bac6ca2f4a3a12d805cb96c5d9debc70d6dd534cb2d0d0
-
SHA512
084ac7a0ce3d096fba9b1c531635a9de4443696c0c5407b0588c2af6d6e251bf10c86bdb0f9a960f290760367cb2102a6aaaf687506e483a595d7771e3c60585
-
SSDEEP
12288:hRXBLdl0sNFxMOTAcfLZhJCWLpf1f7l5VfSwJNcsF0HxFjv1Ddm2QrVApsNZ6E:hRxLjNNFxVT/fLZhJCopf1f7l/SQNco9
Static task
static1
Behavioral task
behavioral1
Sample
0aa1943f8b95c5cb44bac6ca2f4a3a12d805cb96c5d9debc70d6dd534cb2d0d0.exe
Resource
win7-20220901-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
0aa1943f8b95c5cb44bac6ca2f4a3a12d805cb96c5d9debc70d6dd534cb2d0d0
-
Size
643KB
-
MD5
8039b4cdf152123c603b7803aae59f30
-
SHA1
6f8389873918390b7789baee6f2fbd1a85b43b00
-
SHA256
0aa1943f8b95c5cb44bac6ca2f4a3a12d805cb96c5d9debc70d6dd534cb2d0d0
-
SHA512
084ac7a0ce3d096fba9b1c531635a9de4443696c0c5407b0588c2af6d6e251bf10c86bdb0f9a960f290760367cb2102a6aaaf687506e483a595d7771e3c60585
-
SSDEEP
12288:hRXBLdl0sNFxMOTAcfLZhJCWLpf1f7l5VfSwJNcsF0HxFjv1Ddm2QrVApsNZ6E:hRxLjNNFxVT/fLZhJCopf1f7l/SQNco9
-
Modifies firewall policy service
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-