General
-
Target
NEAS.671c2ad6bac6957d6282d87c208844b0_JC.exe
-
Size
120KB
-
Sample
231103-hex6xadd5y
-
MD5
671c2ad6bac6957d6282d87c208844b0
-
SHA1
87c1dfe8c609402663db5851686d710b3aafefd1
-
SHA256
0614a2d98b7b64bae69ac92ccbed90741ea5307cb1d7040ea7c13859621493be
-
SHA512
4fda5565f0f8c0a8f0cfa5ee2bf2a5182b1adf1a3b8e5afe1236f45dd6a5ed24638b177b5676189ececfef3ce4261c1a73f2b956d1f4adf0829776a346a7d1d7
-
SSDEEP
3072:rBzqgD0doC9C7U4ZqF8qN3QPZEFHm4Kuam:Vmw0dxkJZ0OGH7U
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.671c2ad6bac6957d6282d87c208844b0_JC.dll
Resource
win7-20231023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
NEAS.671c2ad6bac6957d6282d87c208844b0_JC.exe
-
Size
120KB
-
MD5
671c2ad6bac6957d6282d87c208844b0
-
SHA1
87c1dfe8c609402663db5851686d710b3aafefd1
-
SHA256
0614a2d98b7b64bae69ac92ccbed90741ea5307cb1d7040ea7c13859621493be
-
SHA512
4fda5565f0f8c0a8f0cfa5ee2bf2a5182b1adf1a3b8e5afe1236f45dd6a5ed24638b177b5676189ececfef3ce4261c1a73f2b956d1f4adf0829776a346a7d1d7
-
SSDEEP
3072:rBzqgD0doC9C7U4ZqF8qN3QPZEFHm4Kuam:Vmw0dxkJZ0OGH7U
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5