General

  • Target

    Injector.exe

  • Size

    328KB

  • Sample

    230712-qqm43sed5v

  • MD5

    c4003c80a718304a1df0627a09aadfe0

  • SHA1

    f34b06e1e0c5f75b5e28c1dc5f6a4d45555cd203

  • SHA256

    fbb1fe5e60fc7f91f834ed0162479bb3d1a02864ade201ae9004f03bf2f3a626

  • SHA512

    1aebbae7a1514bd65dff4268c1dace2e31ca7f1050c5fcd877960995b5c9a09b5e136782927617b3ea2e07780a4fa3f7606b9ba5fd76e0391d3df7604a6c1ff2

  • SSDEEP

    6144:k906ZrGLc9v5ei1f/VlCnU17py8IeGw+VOFIInwm9FB64TIL8ouR:kuc2M/UU1FlU10FA4TecR

Malware Config

Targets

    • Target

      Injector.exe

    • Size

      328KB

    • MD5

      c4003c80a718304a1df0627a09aadfe0

    • SHA1

      f34b06e1e0c5f75b5e28c1dc5f6a4d45555cd203

    • SHA256

      fbb1fe5e60fc7f91f834ed0162479bb3d1a02864ade201ae9004f03bf2f3a626

    • SHA512

      1aebbae7a1514bd65dff4268c1dace2e31ca7f1050c5fcd877960995b5c9a09b5e136782927617b3ea2e07780a4fa3f7606b9ba5fd76e0391d3df7604a6c1ff2

    • SSDEEP

      6144:k906ZrGLc9v5ei1f/VlCnU17py8IeGw+VOFIInwm9FB64TIL8ouR:kuc2M/UU1FlU10FA4TecR

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks