General
-
Target
NEO_Private.exe
-
Size
17.8MB
-
Sample
250105-ashpdaxkem
-
MD5
af9067df231376a3cfb1c2944d355a30
-
SHA1
b2b5aca970b75dab46ba3f8c2c93b0bfd841dfad
-
SHA256
e91e0c6a38be7697c0d7fae0b748d1bc2c47777a84452eaf7f34a1d552f4bf76
-
SHA512
d862bea961c7fdb8befaeb60d38046ec87607d56919af66afb5780e2a73237c0001346ab04e3a46b83b93d3c5cdbecd2c58ce5274c5b21334398bce770faa14d
-
SSDEEP
393216:FqPnLFXlr5Q8DOETgsvfGF5ghrBvEUi8UnJycq:8PLFXN5QhECMWdnu
Behavioral task
behavioral1
Sample
NEO_Private.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NEO_Private.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
NEO_Private.exe
-
Size
17.8MB
-
MD5
af9067df231376a3cfb1c2944d355a30
-
SHA1
b2b5aca970b75dab46ba3f8c2c93b0bfd841dfad
-
SHA256
e91e0c6a38be7697c0d7fae0b748d1bc2c47777a84452eaf7f34a1d552f4bf76
-
SHA512
d862bea961c7fdb8befaeb60d38046ec87607d56919af66afb5780e2a73237c0001346ab04e3a46b83b93d3c5cdbecd2c58ce5274c5b21334398bce770faa14d
-
SSDEEP
393216:FqPnLFXlr5Q8DOETgsvfGF5ghrBvEUi8UnJycq:8PLFXN5QhECMWdnu
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1