General

  • Target

    5272eb5633081ec229c864e0c6fbc36900989010010a448dd12cce4be7b83952

  • Size

    1.6MB

  • Sample

    220717-dgfbnaebfr

  • MD5

    b13338b707a3f01899b967e510470d57

  • SHA1

    53455ca26f91bbcee28a4aa04e0c31451c4138b3

  • SHA256

    5272eb5633081ec229c864e0c6fbc36900989010010a448dd12cce4be7b83952

  • SHA512

    c715d06e416803b1be645daed13e8e158f4b783c0261e2385e5980981fa94352b0f17810d96f2a432229155cec8422725bade0e04db8b716540929a1f4823d34

Malware Config

Targets

    • Target

      5272eb5633081ec229c864e0c6fbc36900989010010a448dd12cce4be7b83952

    • Size

      1.6MB

    • MD5

      b13338b707a3f01899b967e510470d57

    • SHA1

      53455ca26f91bbcee28a4aa04e0c31451c4138b3

    • SHA256

      5272eb5633081ec229c864e0c6fbc36900989010010a448dd12cce4be7b83952

    • SHA512

      c715d06e416803b1be645daed13e8e158f4b783c0261e2385e5980981fa94352b0f17810d96f2a432229155cec8422725bade0e04db8b716540929a1f4823d34

    • Imminent RAT

      Remote-access trojan based on Imminent Monitor remote admin software.

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks