General

  • Target

    NEAS.20b7067b7ab99a8b36f3e8dc5b3834f0.exe

  • Size

    257KB

  • Sample

    231104-r7g5tsdg99

  • MD5

    20b7067b7ab99a8b36f3e8dc5b3834f0

  • SHA1

    72f7cf1d91c075fef111953dc8955ea6490f7eac

  • SHA256

    b585dc6b614a57790662834bf22c9a9b23fb1d1e8bc48cfd2cad308bf25af5ad

  • SHA512

    4caa6c404ff1a2814c4aeab144eb572cb0a7b389059156f9b1701481fb8c427985bbd8a73d2b701e1879e658bf9369c92d6b8b4c66a2a89300d368e1b23d4431

  • SSDEEP

    6144:sPDLCL9Io5R4nM/40yZuEdA7JDPCt63vWaJUrtGTm/7wkCEibRe1EYw:sPKLXqhxdQVPCI/WaEtd/7aVbR+w

Malware Config

Targets

    • Target

      NEAS.20b7067b7ab99a8b36f3e8dc5b3834f0.exe

    • Size

      257KB

    • MD5

      20b7067b7ab99a8b36f3e8dc5b3834f0

    • SHA1

      72f7cf1d91c075fef111953dc8955ea6490f7eac

    • SHA256

      b585dc6b614a57790662834bf22c9a9b23fb1d1e8bc48cfd2cad308bf25af5ad

    • SHA512

      4caa6c404ff1a2814c4aeab144eb572cb0a7b389059156f9b1701481fb8c427985bbd8a73d2b701e1879e658bf9369c92d6b8b4c66a2a89300d368e1b23d4431

    • SSDEEP

      6144:sPDLCL9Io5R4nM/40yZuEdA7JDPCt63vWaJUrtGTm/7wkCEibRe1EYw:sPKLXqhxdQVPCI/WaEtd/7aVbR+w

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks