General
-
Target
cf6a6bc69fea427ccb7f592f670f8ec33c0d28f59a97b452deef80b860e0bedb
-
Size
2.4MB
-
Sample
221020-nrat2acah2
-
MD5
756f81996d742e19b1dd853df3d7c439
-
SHA1
20c3078794e062fb969c07835378098a9dd7a6e8
-
SHA256
cf6a6bc69fea427ccb7f592f670f8ec33c0d28f59a97b452deef80b860e0bedb
-
SHA512
eeb4af91a0e0d7b05df7a9615daa9829e3df69fb4c85fa4031d231b952668030df6b0dcd8111c4ba70d525962c962c6157b6bc0ed5c6763cf2a772bc1f6606ac
-
SSDEEP
49152:VEVUcgFeZtUGHa9Z/FuatgIj6c89HloXHleCIMRIeEJXA5:VE3JDU6oj6Tghb9sX4
Behavioral task
behavioral1
Sample
cf6a6bc69fea427ccb7f592f670f8ec33c0d28f59a97b452deef80b860e0bedb.exe
Resource
win7-20220901-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
cf6a6bc69fea427ccb7f592f670f8ec33c0d28f59a97b452deef80b860e0bedb
-
Size
2.4MB
-
MD5
756f81996d742e19b1dd853df3d7c439
-
SHA1
20c3078794e062fb969c07835378098a9dd7a6e8
-
SHA256
cf6a6bc69fea427ccb7f592f670f8ec33c0d28f59a97b452deef80b860e0bedb
-
SHA512
eeb4af91a0e0d7b05df7a9615daa9829e3df69fb4c85fa4031d231b952668030df6b0dcd8111c4ba70d525962c962c6157b6bc0ed5c6763cf2a772bc1f6606ac
-
SSDEEP
49152:VEVUcgFeZtUGHa9Z/FuatgIj6c89HloXHleCIMRIeEJXA5:VE3JDU6oj6Tghb9sX4
-
Modifies firewall policy service
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-