General
-
Target
NEAS.8fff7224b9f6797279e62dfbfb870930.exe
-
Size
120KB
-
Sample
231118-gffgtach5v
-
MD5
8fff7224b9f6797279e62dfbfb870930
-
SHA1
de5caa8f4b212becf6e382814486d67fe49a0b94
-
SHA256
94ea29d351ddfecddcd8a0305410a907bf040c698da284e99ed5d086b9101c10
-
SHA512
2583550ad57f9a2fc888585d97ea9a4e4fbdd1873a46b4929aba27b65cf93c07b9f05e7c0ef79606dea12da9d2ccf87f22ddd1b90fb8431094eb484254b8cabf
-
SSDEEP
3072:z/MdUoyNpQtWTbTLEGpWcctXQ9i2ofKB3:zMRyTQtWT/LEGkfKB
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8fff7224b9f6797279e62dfbfb870930.dll
Resource
win7-20231020-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
NEAS.8fff7224b9f6797279e62dfbfb870930.exe
-
Size
120KB
-
MD5
8fff7224b9f6797279e62dfbfb870930
-
SHA1
de5caa8f4b212becf6e382814486d67fe49a0b94
-
SHA256
94ea29d351ddfecddcd8a0305410a907bf040c698da284e99ed5d086b9101c10
-
SHA512
2583550ad57f9a2fc888585d97ea9a4e4fbdd1873a46b4929aba27b65cf93c07b9f05e7c0ef79606dea12da9d2ccf87f22ddd1b90fb8431094eb484254b8cabf
-
SSDEEP
3072:z/MdUoyNpQtWTbTLEGpWcctXQ9i2ofKB3:zMRyTQtWT/LEGkfKB
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5