General

  • Target

    NEAS.76bbb08311cd138870f3bb367f561d50_JC.exe

  • Size

    138KB

  • Sample

    231105-tfza5sge6v

  • MD5

    76bbb08311cd138870f3bb367f561d50

  • SHA1

    ae8da08fdc8d55e1c424bfc1519177d1efe4156a

  • SHA256

    45d53aa92d5bc8d3749892850fc0b4168217995bec29a117a5ef421f21ceeb2c

  • SHA512

    acb17f5ea8c546d7fafcd97684fb184d65d69015a706ffac76a046c894a8b03ba4201fcd01638b5e4fd4e65830cf300a4f593aa4c63b8b00160cda37b7fb6b6d

  • SSDEEP

    3072:dvs4dDXEGCLElp1Tj4mYWR/R4nkPR/1aV9PjDC43H5hzhS35A+rR1:NPDLCL+Io5R4nM/4rCaphS317

Malware Config

Targets

    • Target

      NEAS.76bbb08311cd138870f3bb367f561d50_JC.exe

    • Size

      138KB

    • MD5

      76bbb08311cd138870f3bb367f561d50

    • SHA1

      ae8da08fdc8d55e1c424bfc1519177d1efe4156a

    • SHA256

      45d53aa92d5bc8d3749892850fc0b4168217995bec29a117a5ef421f21ceeb2c

    • SHA512

      acb17f5ea8c546d7fafcd97684fb184d65d69015a706ffac76a046c894a8b03ba4201fcd01638b5e4fd4e65830cf300a4f593aa4c63b8b00160cda37b7fb6b6d

    • SSDEEP

      3072:dvs4dDXEGCLElp1Tj4mYWR/R4nkPR/1aV9PjDC43H5hzhS35A+rR1:NPDLCL+Io5R4nM/4rCaphS317

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks