General

  • Target

    NEAS.2beaa9b90baea56ab1a36677099a70c0.exe

  • Size

    399KB

  • Sample

    231102-typjnafa6z

  • MD5

    2beaa9b90baea56ab1a36677099a70c0

  • SHA1

    1223afed4bc1588d1115e4d859eaa796ee76491f

  • SHA256

    0d0ef361ecfab91d0c2b9ee60d0971d4f755b7bd041f9351d06dd312b6b6761c

  • SHA512

    6fb2dfebde43be6f33bd51d0bf3a48fb95c283298d6cfc7c4659bbb2bcc67665c60c7bc19c5940ee59c41c5482ce8d50f527d6e71eec8dc0f118c3fc55806c37

  • SSDEEP

    6144:dXC4vgmhbIxs3NBR6Eg3ZFzd7Y9/fLoJM8EmfaRl2eCRA1NIFHcx4whn5EOzhRLL:dXCNi9BgdzabMA8eCRWQGZ5EONRcc

Malware Config

Targets

    • Target

      NEAS.2beaa9b90baea56ab1a36677099a70c0.exe

    • Size

      399KB

    • MD5

      2beaa9b90baea56ab1a36677099a70c0

    • SHA1

      1223afed4bc1588d1115e4d859eaa796ee76491f

    • SHA256

      0d0ef361ecfab91d0c2b9ee60d0971d4f755b7bd041f9351d06dd312b6b6761c

    • SHA512

      6fb2dfebde43be6f33bd51d0bf3a48fb95c283298d6cfc7c4659bbb2bcc67665c60c7bc19c5940ee59c41c5482ce8d50f527d6e71eec8dc0f118c3fc55806c37

    • SSDEEP

      6144:dXC4vgmhbIxs3NBR6Eg3ZFzd7Y9/fLoJM8EmfaRl2eCRA1NIFHcx4whn5EOzhRLL:dXCNi9BgdzabMA8eCRWQGZ5EONRcc

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks