General

  • Target

    NEAS.3a3363cc03ad5315478e668642bd38e0.exe

  • Size

    2.6MB

  • Sample

    231107-gx6ekaeb43

  • MD5

    3a3363cc03ad5315478e668642bd38e0

  • SHA1

    9fec2560d68cdf0fa79a8b83c9ced58557c4d72c

  • SHA256

    1d3d2a059e088a5a21530ed639b2e3a4e775b99233018224e25022e48bd4f4d5

  • SHA512

    8b4b094e527fe3c95b38d3ad81401ce2b848abe803751407dd4b0cf555554478c9138805f9f1a8d905a7bc4d2872e451e6232f239185bda2bc3bbb8e37198feb

  • SSDEEP

    49152:tU/5M1X4Wl/YvzYCQR9RQs+C40yZpJaD99GA:tKq4oEa9RQs+Cn4/UKA

Malware Config

Targets

    • Target

      NEAS.3a3363cc03ad5315478e668642bd38e0.exe

    • Size

      2.6MB

    • MD5

      3a3363cc03ad5315478e668642bd38e0

    • SHA1

      9fec2560d68cdf0fa79a8b83c9ced58557c4d72c

    • SHA256

      1d3d2a059e088a5a21530ed639b2e3a4e775b99233018224e25022e48bd4f4d5

    • SHA512

      8b4b094e527fe3c95b38d3ad81401ce2b848abe803751407dd4b0cf555554478c9138805f9f1a8d905a7bc4d2872e451e6232f239185bda2bc3bbb8e37198feb

    • SSDEEP

      49152:tU/5M1X4Wl/YvzYCQR9RQs+C40yZpJaD99GA:tKq4oEa9RQs+Cn4/UKA

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks