General

  • Target

    NEAS.4dc454916a1f4612f5ed3beaa354c2e0.exe

  • Size

    197KB

  • Sample

    231013-y53gbahc4v

  • MD5

    4dc454916a1f4612f5ed3beaa354c2e0

  • SHA1

    dc84a0a9b9ad761f42cebdd24b0a9e086e8bdb0d

  • SHA256

    f60b8ab1cdd3b204ec3760848f0da44ac8f30dc62d9c7432d44797d1ddfb4407

  • SHA512

    05da7b0a7169e74417330b42fdb5c60377f646dd2a49e61a4d03c0013aee2020d345f7e160b3b035c756a979dac1a8f607ad866a3ba6a30ad28ac4f42d929d58

  • SSDEEP

    3072:w4a2u1WTgz7okkYkz2iIKX3owEx/bFbbTsN4ziwFhiqjjv+SZI7Sy5wJmACofBN+:FTgz7yNLn9ExzuAigNg5V2N+

Malware Config

Targets

    • Target

      NEAS.4dc454916a1f4612f5ed3beaa354c2e0.exe

    • Size

      197KB

    • MD5

      4dc454916a1f4612f5ed3beaa354c2e0

    • SHA1

      dc84a0a9b9ad761f42cebdd24b0a9e086e8bdb0d

    • SHA256

      f60b8ab1cdd3b204ec3760848f0da44ac8f30dc62d9c7432d44797d1ddfb4407

    • SHA512

      05da7b0a7169e74417330b42fdb5c60377f646dd2a49e61a4d03c0013aee2020d345f7e160b3b035c756a979dac1a8f607ad866a3ba6a30ad28ac4f42d929d58

    • SSDEEP

      3072:w4a2u1WTgz7okkYkz2iIKX3owEx/bFbbTsN4ziwFhiqjjv+SZI7Sy5wJmACofBN+:FTgz7yNLn9ExzuAigNg5V2N+

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks