General

  • Target

    vbc.exe

  • Size

    414KB

  • Sample

    211007-jervkaccbk

  • MD5

    fbc1ed64be96f47d5cc3fbcb21cce10f

  • SHA1

    a2c3c2aa059f835a54f26aa385153690afc3510a

  • SHA256

    0fb3c7511c6494252676592eea6db4da4bc89977c066a5e4f7ea599c3c9ad8d5

  • SHA512

    58a8c2e86ac0b2c180efbc66c2a2069677c2efbf28fe3578cdb03d6fa6396ab6cd54f50c0bde23ff8d045aebb4306ee3be853930511bd2e8dadfe028fa98b62b

Malware Config

Targets

    • Target

      vbc.exe

    • Size

      414KB

    • MD5

      fbc1ed64be96f47d5cc3fbcb21cce10f

    • SHA1

      a2c3c2aa059f835a54f26aa385153690afc3510a

    • SHA256

      0fb3c7511c6494252676592eea6db4da4bc89977c066a5e4f7ea599c3c9ad8d5

    • SHA512

      58a8c2e86ac0b2c180efbc66c2a2069677c2efbf28fe3578cdb03d6fa6396ab6cd54f50c0bde23ff8d045aebb4306ee3be853930511bd2e8dadfe028fa98b62b

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks