General

  • Target

    NEAS.c17f90cf849b28c457ef582ef84be940.exe

  • Size

    157KB

  • Sample

    231013-zew3aafd3y

  • MD5

    c17f90cf849b28c457ef582ef84be940

  • SHA1

    89b3e7b52b3009e12a4bd2c3ad0b40bbc1dc1177

  • SHA256

    4f57dc707475943a6e9c0db393d0b9d90735812851e21ec3fa435125a7fb409a

  • SHA512

    d77d5f9b5cec7f9f1e193cf48acbdf165f41b2527b68c70d42a58f8507b1c4147fa546dba101ef8c7c3582818fc6c5da3e041d7ace9596b57f0bbd5cea4ce847

  • SSDEEP

    3072:gjbLl/gvQoutp1Tj4mYWR/RQs9pqA+V4hFhDHHlAEe:gjluQoS3Io5Rh9f+V4hnHHe

Malware Config

Targets

    • Target

      NEAS.c17f90cf849b28c457ef582ef84be940.exe

    • Size

      157KB

    • MD5

      c17f90cf849b28c457ef582ef84be940

    • SHA1

      89b3e7b52b3009e12a4bd2c3ad0b40bbc1dc1177

    • SHA256

      4f57dc707475943a6e9c0db393d0b9d90735812851e21ec3fa435125a7fb409a

    • SHA512

      d77d5f9b5cec7f9f1e193cf48acbdf165f41b2527b68c70d42a58f8507b1c4147fa546dba101ef8c7c3582818fc6c5da3e041d7ace9596b57f0bbd5cea4ce847

    • SSDEEP

      3072:gjbLl/gvQoutp1Tj4mYWR/RQs9pqA+V4hFhDHHlAEe:gjluQoS3Io5Rh9f+V4hnHHe

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks