General
-
Target
36997d2c6d4900b5513739b7363eb5c097d2f742f832671c40c1caaec46ff570
-
Size
198KB
-
Sample
221124-axm5nafe73
-
MD5
05e5f076000026b695700872f524df43
-
SHA1
68cc96dc66a168355cdbb6ce68b5f759ce08e895
-
SHA256
36997d2c6d4900b5513739b7363eb5c097d2f742f832671c40c1caaec46ff570
-
SHA512
d9520a2365a3fc8149c443793b2e4a4d13e468f6193524da8a88fb363a1284e9f3d7c4e4cf0d7f42e9e2d1d56a9e4eca3dbde3cb890eb9b6b646a9de11fd02ba
-
SSDEEP
3072:SS/DwXHYpagctB1IiYvcesyaA2MA+gLhn3ts4gfpKP42SgTM:SSuhZB1IiYEzAULh3ts4gfpEWgA
Static task
static1
Behavioral task
behavioral1
Sample
36997d2c6d4900b5513739b7363eb5c097d2f742f832671c40c1caaec46ff570.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
36997d2c6d4900b5513739b7363eb5c097d2f742f832671c40c1caaec46ff570.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Targets
-
-
Target
36997d2c6d4900b5513739b7363eb5c097d2f742f832671c40c1caaec46ff570
-
Size
198KB
-
MD5
05e5f076000026b695700872f524df43
-
SHA1
68cc96dc66a168355cdbb6ce68b5f759ce08e895
-
SHA256
36997d2c6d4900b5513739b7363eb5c097d2f742f832671c40c1caaec46ff570
-
SHA512
d9520a2365a3fc8149c443793b2e4a4d13e468f6193524da8a88fb363a1284e9f3d7c4e4cf0d7f42e9e2d1d56a9e4eca3dbde3cb890eb9b6b646a9de11fd02ba
-
SSDEEP
3072:SS/DwXHYpagctB1IiYvcesyaA2MA+gLhn3ts4gfpKP42SgTM:SSuhZB1IiYEzAULh3ts4gfpEWgA
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-