General
-
Target
986b1aa8cf90782a3c512e8bd34a634c59c9843a1bc840f7477b72edc6236668
-
Size
120KB
-
Sample
221203-kbfhssgf82
-
MD5
e0f8dcb6e02b2abeb46abb003d4636f2
-
SHA1
13bb0aa7a2b1ee8ab3e077ee0217825d0e11dfd0
-
SHA256
986b1aa8cf90782a3c512e8bd34a634c59c9843a1bc840f7477b72edc6236668
-
SHA512
0263fbf6abfe2ea2e6a2646bcf22f829eccfa32d941c402d0f2d283331bfd633eace3f88859bc50db0c584729798a7ff6c88f2eff0dbb50d6e72eb9c2150d0c1
-
SSDEEP
3072:PlIiI0xVfYBT7EXThzAQa62YQIa13hKtn1:eiI0xmEDFAQa1Ia1
Static task
static1
Behavioral task
behavioral1
Sample
986b1aa8cf90782a3c512e8bd34a634c59c9843a1bc840f7477b72edc6236668.dll
Resource
win7-20221111-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
986b1aa8cf90782a3c512e8bd34a634c59c9843a1bc840f7477b72edc6236668
-
Size
120KB
-
MD5
e0f8dcb6e02b2abeb46abb003d4636f2
-
SHA1
13bb0aa7a2b1ee8ab3e077ee0217825d0e11dfd0
-
SHA256
986b1aa8cf90782a3c512e8bd34a634c59c9843a1bc840f7477b72edc6236668
-
SHA512
0263fbf6abfe2ea2e6a2646bcf22f829eccfa32d941c402d0f2d283331bfd633eace3f88859bc50db0c584729798a7ff6c88f2eff0dbb50d6e72eb9c2150d0c1
-
SSDEEP
3072:PlIiI0xVfYBT7EXThzAQa62YQIa13hKtn1:eiI0xmEDFAQa1Ia1
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-