General
-
Target
NEAS.4d4916a25ff8009504ba6dd45221e1b0_JC.exe
-
Size
120KB
-
Sample
231105-bbag4sah79
-
MD5
4d4916a25ff8009504ba6dd45221e1b0
-
SHA1
478b61fe4305d55393b2ba5c81a451aa04cc8fad
-
SHA256
1ee99e2349d50db3fadaad51fc635114257025d6abbe41f8194321a395560c04
-
SHA512
0b72e406f79787e95806f9d696f4908ddeaa3e73a7d1620492b8778de5bdd735d58a3e92ad16cc56a3a617a54e790c363cd5f20101a985bd4d99cb55fac53700
-
SSDEEP
1536:XMDo5SVuvNHVcqlT3i1qG3Ivs2r47Xzio/pxLhfdYzCfsmzU31VoGsM:X3U+IzIE20nf6zNmg3zrs
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4d4916a25ff8009504ba6dd45221e1b0_JC.dll
Resource
win7-20231023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
NEAS.4d4916a25ff8009504ba6dd45221e1b0_JC.exe
-
Size
120KB
-
MD5
4d4916a25ff8009504ba6dd45221e1b0
-
SHA1
478b61fe4305d55393b2ba5c81a451aa04cc8fad
-
SHA256
1ee99e2349d50db3fadaad51fc635114257025d6abbe41f8194321a395560c04
-
SHA512
0b72e406f79787e95806f9d696f4908ddeaa3e73a7d1620492b8778de5bdd735d58a3e92ad16cc56a3a617a54e790c363cd5f20101a985bd4d99cb55fac53700
-
SSDEEP
1536:XMDo5SVuvNHVcqlT3i1qG3Ivs2r47Xzio/pxLhfdYzCfsmzU31VoGsM:X3U+IzIE20nf6zNmg3zrs
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5