General

  • Target

    NEAS.a8b3e6726e785ec919f469daca0085c0.exe

  • Size

    1.2MB

  • Sample

    231028-yqcmcahf6t

  • MD5

    a8b3e6726e785ec919f469daca0085c0

  • SHA1

    68350dc9e43da9ce79a97af58d5c51629d7f341d

  • SHA256

    60f41fb93576acb95218dea7e0d71335aa6f1aed8747c580bbe67585e412040f

  • SHA512

    f7262e2e3e38c7d352007f81ec7bceadc2fe2bc0e372eb373766848e40c144e53405fbc276fea8746ed1673e5bfb28726ec6a88a971bcb2480b7966378140751

  • SSDEEP

    12288:KXgvmzFHi0mo5aH0qMzd5807F7dsPJQPDHvd:KXgvOHi0mGaH0qSdPF7dG4V

Malware Config

Targets

    • Target

      NEAS.a8b3e6726e785ec919f469daca0085c0.exe

    • Size

      1.2MB

    • MD5

      a8b3e6726e785ec919f469daca0085c0

    • SHA1

      68350dc9e43da9ce79a97af58d5c51629d7f341d

    • SHA256

      60f41fb93576acb95218dea7e0d71335aa6f1aed8747c580bbe67585e412040f

    • SHA512

      f7262e2e3e38c7d352007f81ec7bceadc2fe2bc0e372eb373766848e40c144e53405fbc276fea8746ed1673e5bfb28726ec6a88a971bcb2480b7966378140751

    • SSDEEP

      12288:KXgvmzFHi0mo5aH0qMzd5807F7dsPJQPDHvd:KXgvOHi0mGaH0qSdPF7dG4V

    • Modifies WinLogon for persistence

    • UAC bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks