General

  • Target

    NEAS.48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e_JC.exe

  • Size

    1.1MB

  • Sample

    231008-vw2lwaeg31

  • MD5

    71732eb5647b8cd8a12cd8cd68502255

  • SHA1

    f262f14249059df102414bfeaa5d61beffe13b40

  • SHA256

    48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e

  • SHA512

    b6df55e57e2c785bc713f92e1b1c6743810c0eebe7967c344f1a5a70ae9dc0c9a8843ff69903623a4b359b15ba9c121f6722f902dfd0b661d6ccb9f1853f790d

  • SSDEEP

    24576:Y7IvpH41Cl36RgrO/+6WdKHsJYrrg0H+2UbDC:Y72mVpOY3gH2UbD

Malware Config

Targets

    • Target

      NEAS.48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e_JC.exe

    • Size

      1.1MB

    • MD5

      71732eb5647b8cd8a12cd8cd68502255

    • SHA1

      f262f14249059df102414bfeaa5d61beffe13b40

    • SHA256

      48a8de2b7c0d0366b5cda3eef79af0575424bb5ac079551593aa16d4861dea4e

    • SHA512

      b6df55e57e2c785bc713f92e1b1c6743810c0eebe7967c344f1a5a70ae9dc0c9a8843ff69903623a4b359b15ba9c121f6722f902dfd0b661d6ccb9f1853f790d

    • SSDEEP

      24576:Y7IvpH41Cl36RgrO/+6WdKHsJYrrg0H+2UbDC:Y72mVpOY3gH2UbD

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Modifies system executable filetype association

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks