General
-
Target
NEAS.6086dadda67109343f916db2c2c18940.exe
-
Size
120KB
-
Sample
231102-t8mstaag45
-
MD5
6086dadda67109343f916db2c2c18940
-
SHA1
9a18a354f4a0e21020bb1f945a1c2f9e511ec3f6
-
SHA256
be36ba9c066efe0a850f91185c22fe498a2c6d90e5e0f765b69ba0a23e635cb0
-
SHA512
9665c7f90a78077936bb6dde95f6c783311c09cc1129a107e56886ff77c3f578eaed19d070cfe54031bb36d7e9f92533945390e9c31b1784a1f0bfc8c67130c0
-
SSDEEP
1536:Rl3mwGkwEULCnd/IYOUFEWObL10QcfWNLSO9zVvxwb3e3F5MhjmHAtz1WZn7cJ:P2FADOtW4ZkOrvxwbwF+hjmHAt
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6086dadda67109343f916db2c2c18940.dll
Resource
win7-20231020-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
NEAS.6086dadda67109343f916db2c2c18940.exe
-
Size
120KB
-
MD5
6086dadda67109343f916db2c2c18940
-
SHA1
9a18a354f4a0e21020bb1f945a1c2f9e511ec3f6
-
SHA256
be36ba9c066efe0a850f91185c22fe498a2c6d90e5e0f765b69ba0a23e635cb0
-
SHA512
9665c7f90a78077936bb6dde95f6c783311c09cc1129a107e56886ff77c3f578eaed19d070cfe54031bb36d7e9f92533945390e9c31b1784a1f0bfc8c67130c0
-
SSDEEP
1536:Rl3mwGkwEULCnd/IYOUFEWObL10QcfWNLSO9zVvxwb3e3F5MhjmHAtz1WZn7cJ:P2FADOtW4ZkOrvxwbwF+hjmHAt
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5