General

  • Target

    NEAS.f9e9407288faf141215561295f2e9996_JC.exe

  • Size

    5.1MB

  • Sample

    231014-p21nwagb78

  • MD5

    f9e9407288faf141215561295f2e9996

  • SHA1

    23526461f2c0a836b371128f2e121f35a94697d4

  • SHA256

    0d463a2ef59b43aba3a021a913d4c855bfc19e638a5663f49effc7461bb59579

  • SHA512

    31243bb553b11f268680f18cfd2cd6289b13b71e88ad44a343072601607b523cb9df4664c318fca7af766a3c7f0d3948942e8c9629c69db1be36685e0100c263

  • SSDEEP

    98304:+Phtf0PqL5vGj9rjzjP5m5mmvigZSME68:DSL5+JX5m5mmKmSMh8

Malware Config

Targets

    • Target

      NEAS.f9e9407288faf141215561295f2e9996_JC.exe

    • Size

      5.1MB

    • MD5

      f9e9407288faf141215561295f2e9996

    • SHA1

      23526461f2c0a836b371128f2e121f35a94697d4

    • SHA256

      0d463a2ef59b43aba3a021a913d4c855bfc19e638a5663f49effc7461bb59579

    • SHA512

      31243bb553b11f268680f18cfd2cd6289b13b71e88ad44a343072601607b523cb9df4664c318fca7af766a3c7f0d3948942e8c9629c69db1be36685e0100c263

    • SSDEEP

      98304:+Phtf0PqL5vGj9rjzjP5m5mmvigZSME68:DSL5+JX5m5mmKmSMh8

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks