General
-
Target
cb907f2a284a33313d3fce6b8bd47d079f75a730574aba92e9d7f6c9b860d326.zip
-
Size
88KB
-
Sample
230523-xtbzjsgg83
-
MD5
4fbaaca16fe6a920f595c811468cf235
-
SHA1
4fa1e29c712eb0d9eb10d0ca462399f78dc81ff9
-
SHA256
a8c2760cc630ecddd4277c60b46f347c13cbb6724d2ea5bf1c8d06fbb0e0a95e
-
SHA512
87afffbce61add88d9f290b99c773f12d745432f7d1f45e84f256657769c281c9423b943a627cfbee24d07d9410625839fba4a2369a2d07bcb318641f784f9e9
-
SSDEEP
1536:NEC1CbZd22H81yXUv9DoSwVuT1vCJs2aiCCmfd012gE6h3QtSptyJSt2latKpKQ/:Z1CbyG8AM2SxFCJqsCo153QtSpti8tb0
Static task
static1
Behavioral task
behavioral1
Sample
C/ProgramData/Sentinel/AFUCache/cb907f2a284a33313d3fce6b8bd47d079f75a730574aba92e9d7f6c9b860d326.exe
Resource
win7-20230220-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
C/ProgramData/Sentinel/AFUCache/cb907f2a284a33313d3fce6b8bd47d079f75a730574aba92e9d7f6c9b860d326
-
Size
100KB
-
MD5
07610dc20adbf18b936d4abb3bb064b1
-
SHA1
b784ce0148ecb4e2028b40b4591b73f4748cbaa9
-
SHA256
cb907f2a284a33313d3fce6b8bd47d079f75a730574aba92e9d7f6c9b860d326
-
SHA512
0eb8be348bca595f5e527ea6185e4e6d7df65aca933654bf11bf928b3943dd8e7cd956572fe571031635e6406ba4313b4277e7b68fe7017e1ac763747cb9e74c
-
SSDEEP
1536:WCdZL4/bNxnOgqmIPpiGDqpUVENPgUXVYyNo3szYS5uU8CSrFXCjXy:WX/b7OgURixCVE5gMVYMGS4U8rrUjy
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-