Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
117b636591d1cef3b372b51694d72dc78b4cb37f998984d966541ead4cbe5172.exe
Resource
win7-20240215-en
General
-
Target
117b636591d1cef3b372b51694d72dc78b4cb37f998984d966541ead4cbe5172.exe
-
Size
2.2MB
-
MD5
017b6def2a637a5f4d26b85bfa2a903b
-
SHA1
83b3b2e971a5f30163bd5e4f9d4b827021cbe291
-
SHA256
117b636591d1cef3b372b51694d72dc78b4cb37f998984d966541ead4cbe5172
-
SHA512
3eabc553fdb1bef1551581f7e323f8c157d1e1387c50f04306d34294f0fff790de7bd1954368091ff3a56d34f488d41b6993d7b1e557b44f1960b71372e6ad65
-
SSDEEP
49152:wdggggMlwsDgo3aKfft5OtH17CZZK2KP/hk4wEvea+jWJ:vwY+KXnCH17CXgh/J
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2740-3-0x0000000002110000-0x00000000031CA000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
117b636591d1cef3b372b51694d72dc78b4cb37f998984d966541ead4cbe5172.exepid process 2740 117b636591d1cef3b372b51694d72dc78b4cb37f998984d966541ead4cbe5172.exe 2740 117b636591d1cef3b372b51694d72dc78b4cb37f998984d966541ead4cbe5172.exe 2740 117b636591d1cef3b372b51694d72dc78b4cb37f998984d966541ead4cbe5172.exe