General

  • Target

    NEAS.0a4cc1aa39745910507641b7afcec690_JC.exe

  • Size

    1.1MB

  • Sample

    231013-vrwvtsec86

  • MD5

    0a4cc1aa39745910507641b7afcec690

  • SHA1

    30127224d55ded39927fb9d28a127089079a3da6

  • SHA256

    d8e8533c880d23b16f8c04e1742854a2f5041df681ec38203e64753e2bc78436

  • SHA512

    e14bd6b218a1e24818aa086272f8ab4e896c7abe31a0ae8e8a452140bc68b25bd047a57b78c630b68d785cc15d2690916149195c268f9dca4c91bd3c6d217622

  • SSDEEP

    24576:NSL643yfEpQdrPCikiVahOOx5N+V2tvu2yt1lYQdoS1l2q8:Nt+W9PCikiVaLxu8byhYQiS1lU

Malware Config

Targets

    • Target

      NEAS.0a4cc1aa39745910507641b7afcec690_JC.exe

    • Size

      1.1MB

    • MD5

      0a4cc1aa39745910507641b7afcec690

    • SHA1

      30127224d55ded39927fb9d28a127089079a3da6

    • SHA256

      d8e8533c880d23b16f8c04e1742854a2f5041df681ec38203e64753e2bc78436

    • SHA512

      e14bd6b218a1e24818aa086272f8ab4e896c7abe31a0ae8e8a452140bc68b25bd047a57b78c630b68d785cc15d2690916149195c268f9dca4c91bd3c6d217622

    • SSDEEP

      24576:NSL643yfEpQdrPCikiVahOOx5N+V2tvu2yt1lYQdoS1l2q8:Nt+W9PCikiVaLxu8byhYQiS1lU

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks