General

  • Target

    NEAS.df3fa0348c0892c9037e8ef76f0daee0_JC.exe

  • Size

    115KB

  • Sample

    231101-y4mpgacg9z

  • MD5

    df3fa0348c0892c9037e8ef76f0daee0

  • SHA1

    a979c7d503d997a680dab95310071c5a568e2b86

  • SHA256

    2e010758368e63bb73a6420a25fc617f5db9410d3a447e69298c0cb30565a3a6

  • SHA512

    c1ef00be18039bf0110bad04b908748409c1c9d2cc267e6670498f273773419e6e00a1ddcc744fca44a433dcbb58591f166cd0ab70a1e17d407833bd71795d24

  • SSDEEP

    1536:f+xbwRJHzyuKGds6VODMohuQVPlIspb3RsVnJJoO7Y3U7Q5jlpuh/w8:QKZyuKG6HnBJGVJJoOSjY1

Malware Config

Targets

    • Target

      NEAS.df3fa0348c0892c9037e8ef76f0daee0_JC.exe

    • Size

      115KB

    • MD5

      df3fa0348c0892c9037e8ef76f0daee0

    • SHA1

      a979c7d503d997a680dab95310071c5a568e2b86

    • SHA256

      2e010758368e63bb73a6420a25fc617f5db9410d3a447e69298c0cb30565a3a6

    • SHA512

      c1ef00be18039bf0110bad04b908748409c1c9d2cc267e6670498f273773419e6e00a1ddcc744fca44a433dcbb58591f166cd0ab70a1e17d407833bd71795d24

    • SSDEEP

      1536:f+xbwRJHzyuKGds6VODMohuQVPlIspb3RsVnJJoO7Y3U7Q5jlpuh/w8:QKZyuKG6HnBJGVJJoOSjY1

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (67) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks