General
-
Target
a667b7b17b074fdfc44175e54cc1feaaef351b4eaa9322da2687ca7460d9a5fd
-
Size
300KB
-
Sample
221129-hyl8rafh32
-
MD5
cc0e67db7cbe361698cd6d9c26cb6247
-
SHA1
e5da85f9a5b32e77ca0de3f74683a9d1a5da66bb
-
SHA256
a667b7b17b074fdfc44175e54cc1feaaef351b4eaa9322da2687ca7460d9a5fd
-
SHA512
2d23364e7743b6038fc4a8642b21569c6ef0a0259e206c717300d55579d0fe8a64fc05415ac14dc7af37c4e771e7378a89750a29570b5f72222adc6782dbfa34
-
SSDEEP
6144:Eef4Q2c0/lXcqg8SJoZRuDH1hh252Gt9pi92nBVOzE:v0/lX9g3oHKc5btHioSQ
Static task
static1
Behavioral task
behavioral1
Sample
a667b7b17b074fdfc44175e54cc1feaaef351b4eaa9322da2687ca7460d9a5fd.exe
Resource
win7-20221111-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
a667b7b17b074fdfc44175e54cc1feaaef351b4eaa9322da2687ca7460d9a5fd
-
Size
300KB
-
MD5
cc0e67db7cbe361698cd6d9c26cb6247
-
SHA1
e5da85f9a5b32e77ca0de3f74683a9d1a5da66bb
-
SHA256
a667b7b17b074fdfc44175e54cc1feaaef351b4eaa9322da2687ca7460d9a5fd
-
SHA512
2d23364e7743b6038fc4a8642b21569c6ef0a0259e206c717300d55579d0fe8a64fc05415ac14dc7af37c4e771e7378a89750a29570b5f72222adc6782dbfa34
-
SSDEEP
6144:Eef4Q2c0/lXcqg8SJoZRuDH1hh252Gt9pi92nBVOzE:v0/lX9g3oHKc5btHioSQ
-
Modifies firewall policy service
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-