General

  • Target

    3d37d9575f02fcd6fd5a56049e372dc3c483eeb5c63e697fc02ffebae9bfb429

  • Size

    3.0MB

  • Sample

    221126-dfmpcabc7y

  • MD5

    a767b656298a999f3c97212fad2dc210

  • SHA1

    aaaffd1b756dd4d8d70af18a59901215cc57be61

  • SHA256

    3d37d9575f02fcd6fd5a56049e372dc3c483eeb5c63e697fc02ffebae9bfb429

  • SHA512

    bbbcf466986eb06489f4c02c87891506a9948b5bb13d20e413c4220892ddb8d304c838023ed56fc4d542ae1aa62cc662a2f5911de4156d5288495a48a9035ebc

  • SSDEEP

    49152:tsCauuraeHgotKI2TEsfkkgu90J83TqaC1puWV355FXw/+UuWV355FXw/+CuWV3d:tsCatrFHgC25ckgu90J8uRxXP

Malware Config

Targets

    • Target

      3d37d9575f02fcd6fd5a56049e372dc3c483eeb5c63e697fc02ffebae9bfb429

    • Size

      3.0MB

    • MD5

      a767b656298a999f3c97212fad2dc210

    • SHA1

      aaaffd1b756dd4d8d70af18a59901215cc57be61

    • SHA256

      3d37d9575f02fcd6fd5a56049e372dc3c483eeb5c63e697fc02ffebae9bfb429

    • SHA512

      bbbcf466986eb06489f4c02c87891506a9948b5bb13d20e413c4220892ddb8d304c838023ed56fc4d542ae1aa62cc662a2f5911de4156d5288495a48a9035ebc

    • SSDEEP

      49152:tsCauuraeHgotKI2TEsfkkgu90J83TqaC1puWV355FXw/+UuWV355FXw/+CuWV3d:tsCatrFHgC25ckgu90J8uRxXP

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks