General

  • Target

    NEAS.9399f53943a362e0bca86efa9fc6b520.exe

  • Size

    360KB

  • Sample

    231103-masg3sac53

  • MD5

    9399f53943a362e0bca86efa9fc6b520

  • SHA1

    d4f564c73d1a31a0bc220e9ae7c8f45111e0c67c

  • SHA256

    b093de41fa94b02a68b5ffbbcece3b4b83469072cb6e9314aaa4c636af2f14ee

  • SHA512

    6920826b832ec853903238f6631613bc429684050011641fc84910d8ce97bb4a6c0dff7593863b8770feeeab04a9ebeb1c3f385c047d9f7e5d1aa899b75f9348

  • SSDEEP

    6144:JjluyDM3Io5R4nM/40yJN/1BWX0g0bXxOO9uTfJ+5XJ6K0ZTYMcWTrQNf:JEyDMhqhFPWoTYHTfJ+18K3/WTrqf

Malware Config

Targets

    • Target

      NEAS.9399f53943a362e0bca86efa9fc6b520.exe

    • Size

      360KB

    • MD5

      9399f53943a362e0bca86efa9fc6b520

    • SHA1

      d4f564c73d1a31a0bc220e9ae7c8f45111e0c67c

    • SHA256

      b093de41fa94b02a68b5ffbbcece3b4b83469072cb6e9314aaa4c636af2f14ee

    • SHA512

      6920826b832ec853903238f6631613bc429684050011641fc84910d8ce97bb4a6c0dff7593863b8770feeeab04a9ebeb1c3f385c047d9f7e5d1aa899b75f9348

    • SSDEEP

      6144:JjluyDM3Io5R4nM/40yJN/1BWX0g0bXxOO9uTfJ+5XJ6K0ZTYMcWTrQNf:JEyDMhqhFPWoTYHTfJ+18K3/WTrqf

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks