General
-
Target
5eade1ca2e2698b8d12b65b8619e4302f91b77a37fbf3c223d314ba9f9b49b0f
-
Size
100KB
-
Sample
221020-nxt5vscbel
-
MD5
7479eea08d54331f5c2f2b915efd59f4
-
SHA1
4d9372123bb2ac6d49c0305a8b1bd7a1bc6390cf
-
SHA256
5eade1ca2e2698b8d12b65b8619e4302f91b77a37fbf3c223d314ba9f9b49b0f
-
SHA512
462ccdb887e91259b61eec2970b6e2997582ca37bc1ec0aa0fe67893d29ec6bf867c9bd704b8b2e2a1061a41e3d44a64337de289ecb99544e7c8cce1b804c493
-
SSDEEP
3072:ifR9gjWxIQ9HdeIm6T3Xqioqjw6dQ4z+5t:uSoreImYNC
Static task
static1
Behavioral task
behavioral1
Sample
5eade1ca2e2698b8d12b65b8619e4302f91b77a37fbf3c223d314ba9f9b49b0f.exe
Resource
win7-20220812-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
5eade1ca2e2698b8d12b65b8619e4302f91b77a37fbf3c223d314ba9f9b49b0f
-
Size
100KB
-
MD5
7479eea08d54331f5c2f2b915efd59f4
-
SHA1
4d9372123bb2ac6d49c0305a8b1bd7a1bc6390cf
-
SHA256
5eade1ca2e2698b8d12b65b8619e4302f91b77a37fbf3c223d314ba9f9b49b0f
-
SHA512
462ccdb887e91259b61eec2970b6e2997582ca37bc1ec0aa0fe67893d29ec6bf867c9bd704b8b2e2a1061a41e3d44a64337de289ecb99544e7c8cce1b804c493
-
SSDEEP
3072:ifR9gjWxIQ9HdeIm6T3Xqioqjw6dQ4z+5t:uSoreImYNC
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-