General

  • Target

    20c185baaab93ad716117f74565e6c70_NEAS

  • Size

    3.1MB

  • Sample

    240507-la7rbsch24

  • MD5

    20c185baaab93ad716117f74565e6c70

  • SHA1

    2fee5c33488191450587b15d7051b245d74f139d

  • SHA256

    d0e95502e34b969c95210c1a75ec5b64bb3050ef091efe2dc66a76c17b711c46

  • SHA512

    04f2f5db7f0674a143c35162e49d97f392a9d806c7a9de9a695cb86260074ace2c1c16bf2bd4cd8baa8c2f86bb066d25b349ee787a855e2cb527e57e39d472d2

  • SSDEEP

    49152:+UJ6ZNXox4SgJhBsfHJq/nCFT4Mv0Pt974:+tR4xGnCtvwU

Malware Config

Targets

    • Target

      20c185baaab93ad716117f74565e6c70_NEAS

    • Size

      3.1MB

    • MD5

      20c185baaab93ad716117f74565e6c70

    • SHA1

      2fee5c33488191450587b15d7051b245d74f139d

    • SHA256

      d0e95502e34b969c95210c1a75ec5b64bb3050ef091efe2dc66a76c17b711c46

    • SHA512

      04f2f5db7f0674a143c35162e49d97f392a9d806c7a9de9a695cb86260074ace2c1c16bf2bd4cd8baa8c2f86bb066d25b349ee787a855e2cb527e57e39d472d2

    • SSDEEP

      49152:+UJ6ZNXox4SgJhBsfHJq/nCFT4Mv0Pt974:+tR4xGnCtvwU

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks