General
-
Target
2c510a1a66a41fb7827111a7b1c60920331409ce4467fb9c14c1e6b98a813ec9
-
Size
713KB
-
Sample
221106-xwhj4sahel
-
MD5
0dac8225578c4be0879052f335468b50
-
SHA1
9aab3358cfa96f3554906bb7f8031d6cb79b7370
-
SHA256
2c510a1a66a41fb7827111a7b1c60920331409ce4467fb9c14c1e6b98a813ec9
-
SHA512
e36906586ebed22c1ca03475e810147ed795ed9bad291c5e1cc74d3d77f9c620233676ac25d30dbae65d9eb04829baf6e61e909f33fad5ed8a5366438450e1bc
-
SSDEEP
12288:BI4v0QuvhzhaHHeXfXJlhLVDH2uxEIG3iD+mU5+65g7INFvZ:BI3U8CKDG3iaJ+UNr
Behavioral task
behavioral1
Sample
2c510a1a66a41fb7827111a7b1c60920331409ce4467fb9c14c1e6b98a813ec9.exe
Resource
win7-20220812-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2c510a1a66a41fb7827111a7b1c60920331409ce4467fb9c14c1e6b98a813ec9
-
Size
713KB
-
MD5
0dac8225578c4be0879052f335468b50
-
SHA1
9aab3358cfa96f3554906bb7f8031d6cb79b7370
-
SHA256
2c510a1a66a41fb7827111a7b1c60920331409ce4467fb9c14c1e6b98a813ec9
-
SHA512
e36906586ebed22c1ca03475e810147ed795ed9bad291c5e1cc74d3d77f9c620233676ac25d30dbae65d9eb04829baf6e61e909f33fad5ed8a5366438450e1bc
-
SSDEEP
12288:BI4v0QuvhzhaHHeXfXJlhLVDH2uxEIG3iD+mU5+65g7INFvZ:BI3U8CKDG3iaJ+UNr
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-