General
-
Target
c840c305261cbee315fb2a1bb1d828d8059dea119e109e3947bb09aa3e543eb7
-
Size
619KB
-
Sample
221029-vlflnafda2
-
MD5
83e9d4fe9b4bfc92ed279a0edcc14e90
-
SHA1
e150c4cc6814ae530597f663371a16e3886f0231
-
SHA256
c840c305261cbee315fb2a1bb1d828d8059dea119e109e3947bb09aa3e543eb7
-
SHA512
ea16134c091ea07e96513db788b6d90c8a2b7ca4849a200bd3e7235c9a42d3d43e107b4650658ec7689474c5908ec8c3e594ee96317d3de741d6f4fbaa1e45be
-
SSDEEP
12288:JDEIbFDK9mihCxU4hUUUDgV2TtWRtfOtPx7jKXA+Cvt+hUQP9GM:JpbE9MxU4IDxTcOtPZjKXAt+GM
Static task
static1
Behavioral task
behavioral1
Sample
c840c305261cbee315fb2a1bb1d828d8059dea119e109e3947bb09aa3e543eb7.exe
Resource
win7-20220901-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
c840c305261cbee315fb2a1bb1d828d8059dea119e109e3947bb09aa3e543eb7
-
Size
619KB
-
MD5
83e9d4fe9b4bfc92ed279a0edcc14e90
-
SHA1
e150c4cc6814ae530597f663371a16e3886f0231
-
SHA256
c840c305261cbee315fb2a1bb1d828d8059dea119e109e3947bb09aa3e543eb7
-
SHA512
ea16134c091ea07e96513db788b6d90c8a2b7ca4849a200bd3e7235c9a42d3d43e107b4650658ec7689474c5908ec8c3e594ee96317d3de741d6f4fbaa1e45be
-
SSDEEP
12288:JDEIbFDK9mihCxU4hUUUDgV2TtWRtfOtPx7jKXA+Cvt+hUQP9GM:JpbE9MxU4IDxTcOtPZjKXAt+GM
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-