General

  • Target

    NEAS.b6a952258c6722fa63d5dda475ff04c0.exe

  • Size

    106KB

  • Sample

    231103-lt69xafg4z

  • MD5

    b6a952258c6722fa63d5dda475ff04c0

  • SHA1

    3b3b4cdbcc5cbe3773615af3ab861463b4db2772

  • SHA256

    39c6a6f56048b45ea0a126a7f1618f62da11f2adffb1727ea6d7322e65ff6b28

  • SHA512

    0f52ed8a4c37d77046b00bfa03917bd59b69f9cc59f5eb241808eb65111cf6ae67a31278f508afdcca282eb94f7839cc849eac429dc4eb5b88fc2ff3c879bf60

  • SSDEEP

    1536:TRiAXaKD5grAhdVA2VukXKzMf3liaL+SWzR+fy1ZZosMiZ7RtEs:liAXaKDLVaroj6SWzosZGyRtEs

Malware Config

Targets

    • Target

      NEAS.b6a952258c6722fa63d5dda475ff04c0.exe

    • Size

      106KB

    • MD5

      b6a952258c6722fa63d5dda475ff04c0

    • SHA1

      3b3b4cdbcc5cbe3773615af3ab861463b4db2772

    • SHA256

      39c6a6f56048b45ea0a126a7f1618f62da11f2adffb1727ea6d7322e65ff6b28

    • SHA512

      0f52ed8a4c37d77046b00bfa03917bd59b69f9cc59f5eb241808eb65111cf6ae67a31278f508afdcca282eb94f7839cc849eac429dc4eb5b88fc2ff3c879bf60

    • SSDEEP

      1536:TRiAXaKD5grAhdVA2VukXKzMf3liaL+SWzR+fy1ZZosMiZ7RtEs:liAXaKDLVaroj6SWzosZGyRtEs

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks