General

  • Target

    599f33c3eff24c7748de28d8189de0894249e1baac8fd0e7c162d8aa989875c4

  • Size

    362KB

  • Sample

    220724-ydc3caebdq

  • MD5

    a1c286d8f670186a3d14ec2766f096c5

  • SHA1

    814121996088aac0011294f974f980553a0f228f

  • SHA256

    599f33c3eff24c7748de28d8189de0894249e1baac8fd0e7c162d8aa989875c4

  • SHA512

    1320de5991cc4c56b6d44544469e3c0074a25658cb080e6c99c537e6b5037806a92138f0958efcf96332f17c75807b0e321550ef3835a72afb1f77b2cbdea12a

Malware Config

Targets

    • Target

      599f33c3eff24c7748de28d8189de0894249e1baac8fd0e7c162d8aa989875c4

    • Size

      362KB

    • MD5

      a1c286d8f670186a3d14ec2766f096c5

    • SHA1

      814121996088aac0011294f974f980553a0f228f

    • SHA256

      599f33c3eff24c7748de28d8189de0894249e1baac8fd0e7c162d8aa989875c4

    • SHA512

      1320de5991cc4c56b6d44544469e3c0074a25658cb080e6c99c537e6b5037806a92138f0958efcf96332f17c75807b0e321550ef3835a72afb1f77b2cbdea12a

    • Detect Neshta payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Sodin,Sodinokibi,REvil

      Ransomware with advanced anti-analysis and privilege escalation functionality.

    • Sodinokibi/Revil sample

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks