General
-
Target
NEAS.5ac62c7541d52c4da40cf9eebb6aebb0.exe
-
Size
120KB
-
Sample
231021-z65thafb77
-
MD5
5ac62c7541d52c4da40cf9eebb6aebb0
-
SHA1
8577e92e66b4bc3f4cee49c1eb2d89f0055836e2
-
SHA256
a45745408dac4ffc665fa0223acdbfc2c0961e2f66760f590a733a331cd4b326
-
SHA512
d8fa48e53c0e030efd1812d01bf08bd870f4ecebf2f0369b71986269c556ea6483b7263e3b0fe8641a8b95000875b0e43e053fab477a98c56ecf2b874df21ded
-
SSDEEP
3072:ZHi0lkwLGxrlBWXHYrwkFlC5MC7wAozbD2w72/UKYql:ZC0byx3eHYZbNAUDT7y
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5ac62c7541d52c4da40cf9eebb6aebb0.dll
Resource
win7-20231020-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
NEAS.5ac62c7541d52c4da40cf9eebb6aebb0.exe
-
Size
120KB
-
MD5
5ac62c7541d52c4da40cf9eebb6aebb0
-
SHA1
8577e92e66b4bc3f4cee49c1eb2d89f0055836e2
-
SHA256
a45745408dac4ffc665fa0223acdbfc2c0961e2f66760f590a733a331cd4b326
-
SHA512
d8fa48e53c0e030efd1812d01bf08bd870f4ecebf2f0369b71986269c556ea6483b7263e3b0fe8641a8b95000875b0e43e053fab477a98c56ecf2b874df21ded
-
SSDEEP
3072:ZHi0lkwLGxrlBWXHYrwkFlC5MC7wAozbD2w72/UKYql:ZC0byx3eHYZbNAUDT7y
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5