General

  • Target

    nes1.exe

  • Size

    75KB

  • Sample

    220313-2tdwcsadh2

  • MD5

    147e760e14fcb833dd6dba8aabfbe092

  • SHA1

    8ae5369a8a95737a8efc4831f5a20ca6b2d959b6

  • SHA256

    4d4f1d9ac5e7887dda018ea46753789a0c3d8e1199ea3c34502aa8da2136fe0e

  • SHA512

    ebad6c551e11acef22e2952131e68dec9931a31f366d89f9d02ed63b3e479a8e6fa2eaa38b6d4c2885e1714e888124c207a7dbc4c15741f5cb11d8081d1198a5

Malware Config

Targets

    • Target

      nes1.exe

    • Size

      75KB

    • MD5

      147e760e14fcb833dd6dba8aabfbe092

    • SHA1

      8ae5369a8a95737a8efc4831f5a20ca6b2d959b6

    • SHA256

      4d4f1d9ac5e7887dda018ea46753789a0c3d8e1199ea3c34502aa8da2136fe0e

    • SHA512

      ebad6c551e11acef22e2952131e68dec9931a31f366d89f9d02ed63b3e479a8e6fa2eaa38b6d4c2885e1714e888124c207a7dbc4c15741f5cb11d8081d1198a5

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks