General
-
Target
NEAS.8d0f10a9ab84ce2f87e2c3342adb6ec0.exe
-
Size
440KB
-
Sample
231022-vybhgafa7t
-
MD5
8d0f10a9ab84ce2f87e2c3342adb6ec0
-
SHA1
b9b8979d1d907eca26a14f81880e59dc7bbfaef0
-
SHA256
f0a9204ae936d9e765bec6ed87cdf94ae16dabbcc00cbda1dc72a5fe555d3478
-
SHA512
796be450c9fd637744e01c9d0d8caef034464371ecd07f6049a29e96de0ef4927920147b3001a553df0d0733443f12a72c526e5106544f384aef5ea0f3042030
-
SSDEEP
3072:uMs3fGBjN1Jrpi0kOBzleK6VU6SaQFQMg6WNjjeOi04Qy/cddX3rZQcVi4Kky:un3MN1JlveK6VUsQOjTjuR/cDZQcVW
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8d0f10a9ab84ce2f87e2c3342adb6ec0.exe
Resource
win7-20231020-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
NEAS.8d0f10a9ab84ce2f87e2c3342adb6ec0.exe
-
Size
440KB
-
MD5
8d0f10a9ab84ce2f87e2c3342adb6ec0
-
SHA1
b9b8979d1d907eca26a14f81880e59dc7bbfaef0
-
SHA256
f0a9204ae936d9e765bec6ed87cdf94ae16dabbcc00cbda1dc72a5fe555d3478
-
SHA512
796be450c9fd637744e01c9d0d8caef034464371ecd07f6049a29e96de0ef4927920147b3001a553df0d0733443f12a72c526e5106544f384aef5ea0f3042030
-
SSDEEP
3072:uMs3fGBjN1Jrpi0kOBzleK6VU6SaQFQMg6WNjjeOi04Qy/cddX3rZQcVi4Kky:un3MN1JlveK6VUsQOjTjuR/cDZQcVW
-
Modifies firewall policy service
-
Modifies visibility of file extensions in Explorer
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6