General
-
Target
Exploit.exe
-
Size
796KB
-
Sample
230829-kwp8qsbe68
-
MD5
88544faee260aede61c03af6edd43236
-
SHA1
9b5a8fcd6961a832ee22317a9eac1699e3174fb4
-
SHA256
a6f6ab5e7f05cbec8868a845a471f758e8f8498f6981fa287526bafcadd80f1f
-
SHA512
09ea4923c401c81cc8800b4868c33ebf27a9ac603eb5703a778e329f87d40bbdef7edf4f8650894802a0279e639f647b556792a6dc856eb85d951eee4e80fcf5
-
SSDEEP
12288:orJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/h2b/9HFJ4:o1xuVVjfFoynPaVBUR8f+kN10EB41s
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-0GMGVTE
-
InstallPath
Java\msdcsc.exe
-
gencode
loY0Hi6SPKca
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
Java_update
Targets
-
-
Target
Exploit.exe
-
Size
796KB
-
MD5
88544faee260aede61c03af6edd43236
-
SHA1
9b5a8fcd6961a832ee22317a9eac1699e3174fb4
-
SHA256
a6f6ab5e7f05cbec8868a845a471f758e8f8498f6981fa287526bafcadd80f1f
-
SHA512
09ea4923c401c81cc8800b4868c33ebf27a9ac603eb5703a778e329f87d40bbdef7edf4f8650894802a0279e639f647b556792a6dc856eb85d951eee4e80fcf5
-
SSDEEP
12288:orJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/h2b/9HFJ4:o1xuVVjfFoynPaVBUR8f+kN10EB41s
-
Detect Neshta payload
-
Modifies WinLogon for persistence
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1