General
-
Target
NEAS.645da147f59a5e503ae8522358afe7b0.exe
-
Size
120KB
-
Sample
231104-rvhwlabd2v
-
MD5
645da147f59a5e503ae8522358afe7b0
-
SHA1
a4d6da358c5285ea052e0cc6814afb1de6c6a48a
-
SHA256
037f0188662c0c48c70c69243393446fd89ad3f3a8d4a7a696467709290e3ec7
-
SHA512
73b1f0dd5dfbd48740a026ccf5c99ca1eb82745b37a45a6a3a20174be88a7ff8cf0955722ecb08739293ac79f3c24f7bfa5402c3affa64716386093da977b35c
-
SSDEEP
1536:RYBmlO4qF5ZiHCLPGOlFrhIlwlERsluK7gL+2i8YXYOFIxJbIbu2baJE1h:RYBmI4qF5cOj71Ik5lxU+2MebWFV
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.645da147f59a5e503ae8522358afe7b0.dll
Resource
win7-20231023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
NEAS.645da147f59a5e503ae8522358afe7b0.exe
-
Size
120KB
-
MD5
645da147f59a5e503ae8522358afe7b0
-
SHA1
a4d6da358c5285ea052e0cc6814afb1de6c6a48a
-
SHA256
037f0188662c0c48c70c69243393446fd89ad3f3a8d4a7a696467709290e3ec7
-
SHA512
73b1f0dd5dfbd48740a026ccf5c99ca1eb82745b37a45a6a3a20174be88a7ff8cf0955722ecb08739293ac79f3c24f7bfa5402c3affa64716386093da977b35c
-
SSDEEP
1536:RYBmlO4qF5ZiHCLPGOlFrhIlwlERsluK7gL+2i8YXYOFIxJbIbu2baJE1h:RYBmI4qF5cOj71Ik5lxU+2MebWFV
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5