General
-
Target
NEAS.0c89967930dd25a5a8b1c769654d09e0_JC.exe
-
Size
4.9MB
-
Sample
231105-fkn43sda29
-
MD5
0c89967930dd25a5a8b1c769654d09e0
-
SHA1
5439eed7b22e185ba310307feb4800d86844600f
-
SHA256
d709892982c2a70e9be9ad76192c836d7b119e287e292157441b8d5ef99cf85d
-
SHA512
4372e7f29298e0a073707f8b17f5ac20167f39458079a2dc5369c163a67e0916e7b4ef4bf09cc8875bd3c32ab2fec60645bbbc7f92a2deb25ee0c4c10e07089a
-
SSDEEP
98304:OuLgywiN1ah6HcG0UJrN7SDgndrHZDMeaNNjt0CKKBgY2r71pZ/APaOR72HgQo0T:P7wq1W6HqULS8djZDTaNNeCKVP5ORsg0
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0c89967930dd25a5a8b1c769654d09e0_JC.exe
Resource
win7-20231023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
NEAS.0c89967930dd25a5a8b1c769654d09e0_JC.exe
-
Size
4.9MB
-
MD5
0c89967930dd25a5a8b1c769654d09e0
-
SHA1
5439eed7b22e185ba310307feb4800d86844600f
-
SHA256
d709892982c2a70e9be9ad76192c836d7b119e287e292157441b8d5ef99cf85d
-
SHA512
4372e7f29298e0a073707f8b17f5ac20167f39458079a2dc5369c163a67e0916e7b4ef4bf09cc8875bd3c32ab2fec60645bbbc7f92a2deb25ee0c4c10e07089a
-
SSDEEP
98304:OuLgywiN1ah6HcG0UJrN7SDgndrHZDMeaNNjt0CKKBgY2r71pZ/APaOR72HgQo0T:P7wq1W6HqULS8djZDTaNNeCKVP5ORsg0
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5