General

  • Target

    NEAS.4b8d8f0eeb538871fee7b0feb57f12d0.exe

  • Size

    148KB

  • Sample

    231021-z6c4gsch6z

  • MD5

    4b8d8f0eeb538871fee7b0feb57f12d0

  • SHA1

    3692b876acc57f2e03621432d60c9dd38d42675b

  • SHA256

    44f163e2c127ddc56ebd37e814879c80f3ecc20e79512e69b4a5f1ab8b7a8889

  • SHA512

    177d20ae7e210fa6dc98b30cda6903b15bb61bc6097ba888fd5174672dff8e3a196c4b4a42022127043d3a50b2f97244e85c1c09b0a7fe891b5ef226ac243388

  • SSDEEP

    1536:TRiAXaKD5UOtVoRlXAtXRr+4Jypr8CBDBow9NhzqPYRCC105gNMKhq9qNeZd:liAXaKD7IAthrdtCo6KP9CG5g6K2Zd

Malware Config

Targets

    • Target

      NEAS.4b8d8f0eeb538871fee7b0feb57f12d0.exe

    • Size

      148KB

    • MD5

      4b8d8f0eeb538871fee7b0feb57f12d0

    • SHA1

      3692b876acc57f2e03621432d60c9dd38d42675b

    • SHA256

      44f163e2c127ddc56ebd37e814879c80f3ecc20e79512e69b4a5f1ab8b7a8889

    • SHA512

      177d20ae7e210fa6dc98b30cda6903b15bb61bc6097ba888fd5174672dff8e3a196c4b4a42022127043d3a50b2f97244e85c1c09b0a7fe891b5ef226ac243388

    • SSDEEP

      1536:TRiAXaKD5UOtVoRlXAtXRr+4Jypr8CBDBow9NhzqPYRCC105gNMKhq9qNeZd:liAXaKD7IAthrdtCo6KP9CG5g6K2Zd

    • Blocklisted process makes network request

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks