Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 08:38
Static task
static1
Behavioral task
behavioral1
Sample
95c505f52f385b48fa894e7cc2dad56803dcb92b163c44429dbed93425da842f.exe
Resource
win7-20220901-en
General
-
Target
95c505f52f385b48fa894e7cc2dad56803dcb92b163c44429dbed93425da842f.exe
-
Size
225KB
-
MD5
1f2786d0fe0ed113cae59a1affcfc101
-
SHA1
da9194f0701bc17cbb0337f1da947e7752544e7c
-
SHA256
95c505f52f385b48fa894e7cc2dad56803dcb92b163c44429dbed93425da842f
-
SHA512
437241f01c90de4a7ed72e2e762faa8717147516601d74ede0420736b0e69ec3bef23d04b533e46621c4fb840f24768bf837fa712bb7d5545d204f9d4c94a0e4
-
SSDEEP
6144:ICnE9ChWTIykxQi/TB4mjCdugLZFutQze7AWP:c9ChWBuQi/TORp9gazfm
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
resource yara_rule behavioral2/memory/4608-132-0x0000000002570000-0x00000000035FE000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4608 95c505f52f385b48fa894e7cc2dad56803dcb92b163c44429dbed93425da842f.exe