General
-
Target
NEAS.78b3cbd6d4fd9505931154d1e6a92020.exe
-
Size
120KB
-
Sample
231116-kbn5yagg86
-
MD5
78b3cbd6d4fd9505931154d1e6a92020
-
SHA1
3a7444c439f882bce24f4687e6dd58aa15b5e6d8
-
SHA256
83d256111924fb7bfc814ea52bf873bfc0b1137d9040bbb7965d6d7c8a8adcaf
-
SHA512
05466875d61adf0454bbe9fa0743f28c59994db8a18cc20b30f02886fed099c1f0888fbfdc6cc3dba18c33ffdb510225b212cb85f680b15f23d06a9269c14990
-
SSDEEP
3072:rsVsSezgtBAhTHhIKHdM+brrf6bKYE1IlFTfq:rm8maTHhIK99brT6uYuI
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.78b3cbd6d4fd9505931154d1e6a92020.dll
Resource
win7-20231023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
NEAS.78b3cbd6d4fd9505931154d1e6a92020.exe
-
Size
120KB
-
MD5
78b3cbd6d4fd9505931154d1e6a92020
-
SHA1
3a7444c439f882bce24f4687e6dd58aa15b5e6d8
-
SHA256
83d256111924fb7bfc814ea52bf873bfc0b1137d9040bbb7965d6d7c8a8adcaf
-
SHA512
05466875d61adf0454bbe9fa0743f28c59994db8a18cc20b30f02886fed099c1f0888fbfdc6cc3dba18c33ffdb510225b212cb85f680b15f23d06a9269c14990
-
SSDEEP
3072:rsVsSezgtBAhTHhIKHdM+brrf6bKYE1IlFTfq:rm8maTHhIK99brT6uYuI
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5