General

  • Target

    NEAS.0d499b527c64438aa701855a7200c450_JC.exe

  • Size

    119KB

  • Sample

    231011-vsb7tabd7s

  • MD5

    0d499b527c64438aa701855a7200c450

  • SHA1

    7ce24fd2f5264f5d6df4f9718cac095795c5579d

  • SHA256

    bb77f56d39e46871a59e44d12ea41c5ba4a99409f757ac93bd1dfd4d7b0da574

  • SHA512

    70483a715166df0621e5ec7e0d57f615abb73262d2e8c9c14db23b34d520351e57610ef531ce52184ecfea1e8ae4bea687a12ceeb91a53121795294d77c01d06

  • SSDEEP

    3072:7kHvKztqFLCOd397CSoHrXM5eUzXFELGM54Zhx1:Kv0tqFLt5xoLMJLNMiz

Malware Config

Targets

    • Target

      NEAS.0d499b527c64438aa701855a7200c450_JC.exe

    • Size

      119KB

    • MD5

      0d499b527c64438aa701855a7200c450

    • SHA1

      7ce24fd2f5264f5d6df4f9718cac095795c5579d

    • SHA256

      bb77f56d39e46871a59e44d12ea41c5ba4a99409f757ac93bd1dfd4d7b0da574

    • SHA512

      70483a715166df0621e5ec7e0d57f615abb73262d2e8c9c14db23b34d520351e57610ef531ce52184ecfea1e8ae4bea687a12ceeb91a53121795294d77c01d06

    • SSDEEP

      3072:7kHvKztqFLCOd397CSoHrXM5eUzXFELGM54Zhx1:Kv0tqFLt5xoLMJLNMiz

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks