General
-
Target
NEAS.7e2fc238252c47231d37ab938055672b07423ce2688bb32cff3b97dc179fee9b.exe
-
Size
11.6MB
-
Sample
231115-vrvmrsda99
-
MD5
ba200438ff24d871a56dff7a2df554eb
-
SHA1
61ed0d05ccc16607e5f26eaf487f1a97a17ae179
-
SHA256
7e2fc238252c47231d37ab938055672b07423ce2688bb32cff3b97dc179fee9b
-
SHA512
a095a2e012c7a947fc76e754ae6dc23e41114dac129f332a3fb8457f602d905470018df2e755103666d9d9fe4383bdefa64e8802a8798103a99890db31392f86
-
SSDEEP
98304:DAbxta1VhHg2ZWlJzbTKbq99/fKG1nEB/bE7ccv+1111mTPeiv0xxx++BYzlfj8L:DAbxtaDhHg2Zzbq99/yyn77RMC1Qv5
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7e2fc238252c47231d37ab938055672b07423ce2688bb32cff3b97dc179fee9b.exe
Resource
win7-20231023-en
Malware Config
Targets
-
-
Target
NEAS.7e2fc238252c47231d37ab938055672b07423ce2688bb32cff3b97dc179fee9b.exe
-
Size
11.6MB
-
MD5
ba200438ff24d871a56dff7a2df554eb
-
SHA1
61ed0d05ccc16607e5f26eaf487f1a97a17ae179
-
SHA256
7e2fc238252c47231d37ab938055672b07423ce2688bb32cff3b97dc179fee9b
-
SHA512
a095a2e012c7a947fc76e754ae6dc23e41114dac129f332a3fb8457f602d905470018df2e755103666d9d9fe4383bdefa64e8802a8798103a99890db31392f86
-
SSDEEP
98304:DAbxta1VhHg2ZWlJzbTKbq99/fKG1nEB/bE7ccv+1111mTPeiv0xxx++BYzlfj8L:DAbxtaDhHg2Zzbq99/yyn77RMC1Qv5
-
Glupteba payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1