General

  • Target

    NEAS.f0ec8567ceacef3b86202794d7b38480_JC.exe

  • Size

    899KB

  • Sample

    231031-telzescg79

  • MD5

    f0ec8567ceacef3b86202794d7b38480

  • SHA1

    ff774ff04dfcb29334911f8108af3d002bada503

  • SHA256

    4fba88186ec28a2e7cebee7726d7ffcb32226818eab646566a24f0b6fd003749

  • SHA512

    08afab1d75910170f7d9dcb667aeb16bdb0ace9277a0a5975667ad1d4f1072b80a88c0463f0a317be27520399baddf0693bf30275ae069019153746e462996a5

  • SSDEEP

    24576:sSLSy28ildoNLKMi/ozSovNTz4ghtIzZ+pYyYm6m:sOglpMi/oWovRMqYjpm

Malware Config

Targets

    • Target

      NEAS.f0ec8567ceacef3b86202794d7b38480_JC.exe

    • Size

      899KB

    • MD5

      f0ec8567ceacef3b86202794d7b38480

    • SHA1

      ff774ff04dfcb29334911f8108af3d002bada503

    • SHA256

      4fba88186ec28a2e7cebee7726d7ffcb32226818eab646566a24f0b6fd003749

    • SHA512

      08afab1d75910170f7d9dcb667aeb16bdb0ace9277a0a5975667ad1d4f1072b80a88c0463f0a317be27520399baddf0693bf30275ae069019153746e462996a5

    • SSDEEP

      24576:sSLSy28ildoNLKMi/ozSovNTz4ghtIzZ+pYyYm6m:sOglpMi/oWovRMqYjpm

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks