General
-
Target
Genalf.exe
-
Size
4.4MB
-
Sample
230722-vg51rabe85
-
MD5
859548a7f3a98727f5d07f82e53b3973
-
SHA1
f86c376661bd7d15d2ef663ac94990f72255ee8e
-
SHA256
f395924891b51c1131ea1f3b27cacd12ab52bbb63a1ee6b2d380f6f6db238510
-
SHA512
d0f4c667bc019b568eec09f7db930c0c3763594225a8ddc741c3a52d692a48942162bc6a7c0622ec966916407496d37f42f10baa82320da8d275230d1e481b72
-
SSDEEP
98304:f9QSpqvxZ6PghB4/ErFi244Nqk9Ht15Uwe6zEPxhBgu4IGvzm:fTqpZ6PuB4/EJiT4NJN12UgP4I
Static task
static1
Behavioral task
behavioral1
Sample
Genalf.exe
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
Genalf.exe
-
Size
4.4MB
-
MD5
859548a7f3a98727f5d07f82e53b3973
-
SHA1
f86c376661bd7d15d2ef663ac94990f72255ee8e
-
SHA256
f395924891b51c1131ea1f3b27cacd12ab52bbb63a1ee6b2d380f6f6db238510
-
SHA512
d0f4c667bc019b568eec09f7db930c0c3763594225a8ddc741c3a52d692a48942162bc6a7c0622ec966916407496d37f42f10baa82320da8d275230d1e481b72
-
SSDEEP
98304:f9QSpqvxZ6PghB4/ErFi244Nqk9Ht15Uwe6zEPxhBgu4IGvzm:fTqpZ6PuB4/EJiT4NJN12UgP4I
Score10/10-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Event Triggered Execution
1Change Default File Association
1Defense Evasion
Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1