General

  • Target

    1f6e98e617ae9025b833ab220d205216938751881c1399bca1e67835b11d4395

  • Size

    89KB

  • Sample

    240203-vng79sgecj

  • MD5

    c37df2fb1a7554b26d25eff2336d819a

  • SHA1

    c0aca92e933ac1d61d68e3ed75c844734674e8dd

  • SHA256

    1f6e98e617ae9025b833ab220d205216938751881c1399bca1e67835b11d4395

  • SHA512

    bcb18378db582e8b61131edba46aacf4ff314113de928304f2b3fbaeeff4ca90659fd968d6d2b1f6f2e9fb840ebc9e629dde17bd39c26d592e2825f2f5a19319

  • SSDEEP

    1536:JxqjQ+P04wsmJCWiDY4sxuxas1318HxZATvnsblYOW/:sr85CBYpIz1318RZEvsbyOg

Malware Config

Targets

    • Target

      1f6e98e617ae9025b833ab220d205216938751881c1399bca1e67835b11d4395

    • Size

      89KB

    • MD5

      c37df2fb1a7554b26d25eff2336d819a

    • SHA1

      c0aca92e933ac1d61d68e3ed75c844734674e8dd

    • SHA256

      1f6e98e617ae9025b833ab220d205216938751881c1399bca1e67835b11d4395

    • SHA512

      bcb18378db582e8b61131edba46aacf4ff314113de928304f2b3fbaeeff4ca90659fd968d6d2b1f6f2e9fb840ebc9e629dde17bd39c26d592e2825f2f5a19319

    • SSDEEP

      1536:JxqjQ+P04wsmJCWiDY4sxuxas1318HxZATvnsblYOW/:sr85CBYpIz1318RZEvsbyOg

    • Detect Neshta payload

    • MAKOP ransomware payload

    • Makop

      Ransomware family discovered by @VK_Intel in early 2020.

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks