General
-
Target
018111e36651a7a4590818f65190a2f74278c9ac5a964506009c115bebc76ef8
-
Size
1.3MB
-
Sample
221129-ryrmxahc49
-
MD5
4753fe490e06759ed4af57c52959cde9
-
SHA1
7fae7af36fc9fb30385cf462f397ebe738610eb0
-
SHA256
018111e36651a7a4590818f65190a2f74278c9ac5a964506009c115bebc76ef8
-
SHA512
70131ad6d76aa6d9a614731d8e9bf983d7819d97b40aafe6d8c5e93e608e2ba882cbd3b98574d7c73f7344b941682b225a36e29e61bb49f72304c431ca590f73
-
SSDEEP
24576:KaHMv6Corjqny/Q5U0JW0fRqrSPy/2wP1aoUJ4:K1vqjd/Q5U0EiRI/2wdaA
Static task
static1
Behavioral task
behavioral1
Sample
018111e36651a7a4590818f65190a2f74278c9ac5a964506009c115bebc76ef8.exe
Resource
win7-20221111-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
018111e36651a7a4590818f65190a2f74278c9ac5a964506009c115bebc76ef8
-
Size
1.3MB
-
MD5
4753fe490e06759ed4af57c52959cde9
-
SHA1
7fae7af36fc9fb30385cf462f397ebe738610eb0
-
SHA256
018111e36651a7a4590818f65190a2f74278c9ac5a964506009c115bebc76ef8
-
SHA512
70131ad6d76aa6d9a614731d8e9bf983d7819d97b40aafe6d8c5e93e608e2ba882cbd3b98574d7c73f7344b941682b225a36e29e61bb49f72304c431ca590f73
-
SSDEEP
24576:KaHMv6Corjqny/Q5U0JW0fRqrSPy/2wP1aoUJ4:K1vqjd/Q5U0EiRI/2wdaA
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Modifies firewall policy service
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of SetThreadContext
-