General

  • Target

    NEAS.b77cc9e37946f6589decfa1385b121050721e81d0ff0afbe4aee09116f164abb_JC.exe

  • Size

    1.1MB

  • Sample

    231007-qnmersfa28

  • MD5

    5b25b16b62254e3f2733a0f7d624f52a

  • SHA1

    968f297868bd4a07b07f0ebe1b7ee2597bb1a0e1

  • SHA256

    b77cc9e37946f6589decfa1385b121050721e81d0ff0afbe4aee09116f164abb

  • SHA512

    778d9f6095fb4111c3247785f46f576ade4683eb2a0417127156a5af4ca1534c3b94501c4f845c086a42447dc5b79b429d246a98b2492ff8b24e99f903b8830b

  • SSDEEP

    6144:ol51orRJXlDixHkUXe34cEOkCybEaQRXr9HNdvOa51BgVWWStmyyye/:sqXUHkUXe3GOkx2LIazBg0tmyyyI

Score
10/10
upx

Malware Config

Targets

    • Target

      NEAS.b77cc9e37946f6589decfa1385b121050721e81d0ff0afbe4aee09116f164abb_JC.exe

    • Size

      1.1MB

    • MD5

      5b25b16b62254e3f2733a0f7d624f52a

    • SHA1

      968f297868bd4a07b07f0ebe1b7ee2597bb1a0e1

    • SHA256

      b77cc9e37946f6589decfa1385b121050721e81d0ff0afbe4aee09116f164abb

    • SHA512

      778d9f6095fb4111c3247785f46f576ade4683eb2a0417127156a5af4ca1534c3b94501c4f845c086a42447dc5b79b429d246a98b2492ff8b24e99f903b8830b

    • SSDEEP

      6144:ol51orRJXlDixHkUXe34cEOkCybEaQRXr9HNdvOa51BgVWWStmyyye/:sqXUHkUXe3GOkx2LIazBg0tmyyyI

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks