General
-
Target
NEAS.0d37d20f28fe07c5f9097b62dacef000_JC.exe
-
Size
120KB
-
Sample
231011-vrh9qsda69
-
MD5
0d37d20f28fe07c5f9097b62dacef000
-
SHA1
9f3de14e2c9dcbc142814b4408cf783e5a6446a9
-
SHA256
d4c434dce2f8d291ca03c82c1f1eedff9eaddd0939e0dd2328e85e22f9960978
-
SHA512
91ab2508e2ac4730f635a454910294ebb5f097b6b3544e8500b9348f01be45594c6f67558ae1e246041da8ca61f6b5f8f96804d0d8a43a7efee0e8ccb1ff1476
-
SSDEEP
1536:jmQ2g/gcBlpvAd3jGTfNyAGlGOosmbUC2RH9N9lOkXj1mBlt53IcESgnRRdZ:phfZPyAGlGOtmAnF9NakT1GlTEDt
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0d37d20f28fe07c5f9097b62dacef000_JC.dll
Resource
win7-20230831-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
NEAS.0d37d20f28fe07c5f9097b62dacef000_JC.exe
-
Size
120KB
-
MD5
0d37d20f28fe07c5f9097b62dacef000
-
SHA1
9f3de14e2c9dcbc142814b4408cf783e5a6446a9
-
SHA256
d4c434dce2f8d291ca03c82c1f1eedff9eaddd0939e0dd2328e85e22f9960978
-
SHA512
91ab2508e2ac4730f635a454910294ebb5f097b6b3544e8500b9348f01be45594c6f67558ae1e246041da8ca61f6b5f8f96804d0d8a43a7efee0e8ccb1ff1476
-
SSDEEP
1536:jmQ2g/gcBlpvAd3jGTfNyAGlGOosmbUC2RH9N9lOkXj1mBlt53IcESgnRRdZ:phfZPyAGlGOtmAnF9NakT1GlTEDt
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5