General
-
Target
NEAS.4ff669a8721b5440dc1d3bc343fe2aa0.exe
-
Size
200KB
-
Sample
231014-wg4y5aac8z
-
MD5
4ff669a8721b5440dc1d3bc343fe2aa0
-
SHA1
a4c5f4ae4ea7f91554e5cecc412bd93c928d6b96
-
SHA256
f88d8868352761392ef37cbdebcdfc70bc063f3675b3c0981cc2c6ef9d4acaa4
-
SHA512
aab643d1cf8a0fc822c4692057fcc67d91f9a32e3dc31a7c31a2f98dc6446560b2edce074884e5ee78097ba824982f6da9c17671ee981c482c68472ff4afa209
-
SSDEEP
6144:cjsIGmq3ZvLPpiI4lG1e6C2RpUkZ+RdDKB/Hd:cjzvqJoG1FC2fTZ+RdU9
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4ff669a8721b5440dc1d3bc343fe2aa0.exe
Resource
win7-20230831-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
NEAS.4ff669a8721b5440dc1d3bc343fe2aa0.exe
-
Size
200KB
-
MD5
4ff669a8721b5440dc1d3bc343fe2aa0
-
SHA1
a4c5f4ae4ea7f91554e5cecc412bd93c928d6b96
-
SHA256
f88d8868352761392ef37cbdebcdfc70bc063f3675b3c0981cc2c6ef9d4acaa4
-
SHA512
aab643d1cf8a0fc822c4692057fcc67d91f9a32e3dc31a7c31a2f98dc6446560b2edce074884e5ee78097ba824982f6da9c17671ee981c482c68472ff4afa209
-
SSDEEP
6144:cjsIGmq3ZvLPpiI4lG1e6C2RpUkZ+RdDKB/Hd:cjzvqJoG1FC2fTZ+RdU9
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5