General
-
Target
NEAS.93f1479a6e2252c8770fcb199ff39840.exe
-
Size
100KB
-
Sample
231014-wpp5yadb8t
-
MD5
93f1479a6e2252c8770fcb199ff39840
-
SHA1
80c36371867eacb217931fb026d3f02b145f1870
-
SHA256
254be971dc32d4e0c051e47fd4866488979504a912f097ec0bdb7d7ce3bf78da
-
SHA512
76154435f1e0d74ee5b1c78f9ca86aba3d00bb6c8947807b765a050988c171573ec4f8567d67f261bc63721f12b750308ecddaefb27eaf4266c027a24901e4d9
-
SSDEEP
1536:62Cl/scTNGaYn2J4RbQyySryDO64rN3TGx1XZko6KuOp5gMu0cmZLdpTuhLZj:6NNQa+2JryHrci3kndjgucCxEj
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.93f1479a6e2252c8770fcb199ff39840.exe
Resource
win7-20230831-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
NEAS.93f1479a6e2252c8770fcb199ff39840.exe
-
Size
100KB
-
MD5
93f1479a6e2252c8770fcb199ff39840
-
SHA1
80c36371867eacb217931fb026d3f02b145f1870
-
SHA256
254be971dc32d4e0c051e47fd4866488979504a912f097ec0bdb7d7ce3bf78da
-
SHA512
76154435f1e0d74ee5b1c78f9ca86aba3d00bb6c8947807b765a050988c171573ec4f8567d67f261bc63721f12b750308ecddaefb27eaf4266c027a24901e4d9
-
SSDEEP
1536:62Cl/scTNGaYn2J4RbQyySryDO64rN3TGx1XZko6KuOp5gMu0cmZLdpTuhLZj:6NNQa+2JryHrci3kndjgucCxEj
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5