General
-
Target
a09b7c29fcb31f25a15ab4374811ae38a9b2f939d60ec4fff241c3d2d4e38a84
-
Size
96KB
-
Sample
221129-hyt9csfh46
-
MD5
92ec39f6cd1c4f9467972a46b86b2487
-
SHA1
475fd199eb65da6ea132c76d930502a41cdacca6
-
SHA256
a09b7c29fcb31f25a15ab4374811ae38a9b2f939d60ec4fff241c3d2d4e38a84
-
SHA512
0b5394f5169b2f8f12def4ab46cc38a422dbc8541e8d53b0cc4d17e4086fed666b64dbc0e4388324c1747b644f1ef038969405a6f43c9b13c8594342cadce6bf
-
SSDEEP
1536:2a/yiQKQSRR/wLQFtunX2SldbaJsxAqOmmFLeRvm6UaApvGOXa4t2SrOYScznjMo:WiQOrFtuX2SlRqFarUaARGV4czYXbIo
Static task
static1
Behavioral task
behavioral1
Sample
a09b7c29fcb31f25a15ab4374811ae38a9b2f939d60ec4fff241c3d2d4e38a84.exe
Resource
win7-20221111-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
a09b7c29fcb31f25a15ab4374811ae38a9b2f939d60ec4fff241c3d2d4e38a84
-
Size
96KB
-
MD5
92ec39f6cd1c4f9467972a46b86b2487
-
SHA1
475fd199eb65da6ea132c76d930502a41cdacca6
-
SHA256
a09b7c29fcb31f25a15ab4374811ae38a9b2f939d60ec4fff241c3d2d4e38a84
-
SHA512
0b5394f5169b2f8f12def4ab46cc38a422dbc8541e8d53b0cc4d17e4086fed666b64dbc0e4388324c1747b644f1ef038969405a6f43c9b13c8594342cadce6bf
-
SSDEEP
1536:2a/yiQKQSRR/wLQFtunX2SldbaJsxAqOmmFLeRvm6UaApvGOXa4t2SrOYScznjMo:WiQOrFtuX2SlRqFarUaARGV4czYXbIo
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-