General

  • Target

    NEAS.09b4b73accce4b5b854b5c17b3ac5790_JC.exe

  • Size

    240KB

  • Sample

    231012-vq21fsfe94

  • MD5

    09b4b73accce4b5b854b5c17b3ac5790

  • SHA1

    35916dfe2b99ebfa5022577127329d2f028c2e4e

  • SHA256

    4149949653e5c6d6a025c90787420783fd609726eae98c87ff36548862c50bc0

  • SHA512

    13e955483b9cb372146bb9b86765c89256876dab59ca0b74d756d3790916403e5efd81276803fb0d16d2e8ec7ed305970b412a528833466917aeb3270d787b48

  • SSDEEP

    6144:INLdyCm0sxs3NBR7m8j2GdJQyitPpb2kUP:INLEi9Bs82G/QpRb2kUP

Malware Config

Targets

    • Target

      NEAS.09b4b73accce4b5b854b5c17b3ac5790_JC.exe

    • Size

      240KB

    • MD5

      09b4b73accce4b5b854b5c17b3ac5790

    • SHA1

      35916dfe2b99ebfa5022577127329d2f028c2e4e

    • SHA256

      4149949653e5c6d6a025c90787420783fd609726eae98c87ff36548862c50bc0

    • SHA512

      13e955483b9cb372146bb9b86765c89256876dab59ca0b74d756d3790916403e5efd81276803fb0d16d2e8ec7ed305970b412a528833466917aeb3270d787b48

    • SSDEEP

      6144:INLdyCm0sxs3NBR7m8j2GdJQyitPpb2kUP:INLEi9Bs82G/QpRb2kUP

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks