General

  • Target

    NEAS.3403dfd081a35692b29265c832c67680.exe

  • Size

    666KB

  • Sample

    231022-vtn8rsce8t

  • MD5

    3403dfd081a35692b29265c832c67680

  • SHA1

    68f98cec69f9bd4b3ca1159258291ca2e3f0cecc

  • SHA256

    f00a8f4b541dbc95efbf444b263b9a1ea146497ba6d673349437949704bf2354

  • SHA512

    6260aa8baa50ef13bc5459194fa951fe9164a533a26f2e234c6acc7ccd3132ec993eaed84829310f8a2116e385681dfbd0b8cf9a6ab5b3b8d7aca49a3cb39bdd

  • SSDEEP

    12288:SEQoS86TDNKC0LN3K4GzPiiSa/CXB1+kaPFNZYkHWbup6ZI+1uej:SyLGJSa/yB8xPZ/WnZ1

Malware Config

Targets

    • Target

      NEAS.3403dfd081a35692b29265c832c67680.exe

    • Size

      666KB

    • MD5

      3403dfd081a35692b29265c832c67680

    • SHA1

      68f98cec69f9bd4b3ca1159258291ca2e3f0cecc

    • SHA256

      f00a8f4b541dbc95efbf444b263b9a1ea146497ba6d673349437949704bf2354

    • SHA512

      6260aa8baa50ef13bc5459194fa951fe9164a533a26f2e234c6acc7ccd3132ec993eaed84829310f8a2116e385681dfbd0b8cf9a6ab5b3b8d7aca49a3cb39bdd

    • SSDEEP

      12288:SEQoS86TDNKC0LN3K4GzPiiSa/CXB1+kaPFNZYkHWbup6ZI+1uej:SyLGJSa/yB8xPZ/WnZ1

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks