General

  • Target

    NEAS.e2dad114120cc9b929587c8bac819c90.exe

  • Size

    227KB

  • Sample

    231022-v3lh8sbg87

  • MD5

    e2dad114120cc9b929587c8bac819c90

  • SHA1

    677f7da1cdacdddd1192bf7a394abda2eab9c9fc

  • SHA256

    2b6807c9a11a3fd3672cc25bbb1799f5c3be4bcb490eb9fc2da7b5a0801f25bd

  • SHA512

    9b07be8d907b5de0affd29e445f45e4e2da2c638d50be3d112a675c93b98de6eb56d71c3e76fca93b218f7be0b4d6874ebe8bca65b1d4739efc885aecf6bf942

  • SSDEEP

    6144:aDOxZXPIo5R4nM/40yJoC27pvZUoXGlKTktq9ejh1EFUl5sk:lXpqhop6lUksejEFWSk

Malware Config

Targets

    • Target

      NEAS.e2dad114120cc9b929587c8bac819c90.exe

    • Size

      227KB

    • MD5

      e2dad114120cc9b929587c8bac819c90

    • SHA1

      677f7da1cdacdddd1192bf7a394abda2eab9c9fc

    • SHA256

      2b6807c9a11a3fd3672cc25bbb1799f5c3be4bcb490eb9fc2da7b5a0801f25bd

    • SHA512

      9b07be8d907b5de0affd29e445f45e4e2da2c638d50be3d112a675c93b98de6eb56d71c3e76fca93b218f7be0b4d6874ebe8bca65b1d4739efc885aecf6bf942

    • SSDEEP

      6144:aDOxZXPIo5R4nM/40yJoC27pvZUoXGlKTktq9ejh1EFUl5sk:lXpqhop6lUksejEFWSk

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks