General

  • Target

    Neshta.exe

  • Size

    719KB

  • Sample

    240218-xkedbaeb68

  • MD5

    8474039d83805eb7b447325c3a8d1ebb

  • SHA1

    a07d537f4253745a087709a9a07c449f84deed8d

  • SHA256

    b2493a580153291b69ca23190d00a00b1220cd0aadf469b3974fdaa726516649

  • SHA512

    3272091bbf123ba5e1592e8b2bd7740cddcb174fa158bc6980b25ee61d92387e94a25284736253f83a6eea78b427f6717e888e843db9d7759cfe9a7676576438

  • SSDEEP

    12288:q4UOTYQivI2qZ7aSgLwkFVpzUvest4ZEbjJLuhJVoM7SPd:bRTYVQ2qZ7aSgLwuVfstRJL6YM6

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Recovery_Instructions.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">815201A8D536FE72D39430928A60A1230816F34A22B41C6B8A44583FCA4F7F6442846FFD31107B21E4001F4FCFD6844C3B2E9DC208B0202950D058FF74DF334B<br>E3BCD5DB8950513C4B03B2D9730E23FEB365F2AB8A1321233189816BFD894ACB33C3CBE94F9DA272CB1364A7AAD4A5D807A400A358BB598464C4C0F34D28<br>C3A88B0FA0BF6EE50478F682692B2E08851AD9E876E54DB07C5745E5B7818A7F16B9402E09C6C1E6F62D06D39AA590A5236C17057E53EAC822D8E382B2F6<br>94644A4F84CA9C9429A9BE1491C137AA65752C3D2B581C6904E595E35653D7237F0107D4327B129F9BE942C29DEDD3AF7A0A0F91FC6033FEDC6E18552119<br>1EC6DE74316DAC07281BB85F7EF947F9375F8C5BEE5ACFA001CAC94E963DA7DA3E0F22B5FF61AC33DE1A1AF5F00E61F4E5C2DE0177811EE99692DD932519<br>E5CDF0D057ECD0A3BC91E6FCC22B2FC879CBBD8061A6FFC1102F54FC75C9A6A0CE81CF67E459A0431C477F68F144F03E3923CEA3C9516BA28CD8445A2B00<br>CB3EE1C09C95D8184F4CEC3E75049874F71E40CF99AAF9712B72BAEBF9E9E7AF26B524DF8D18A4136B759AE08D47845F0F4ED6D7E313E6EF77AB978C9BAF<br>6ABCA4E7526DDF08761112C13C998F723E8441114EEF29E0276525D1EFA9125B7030885880664B83AD5B01B3989ADA13713A625D7DC7BC88B42CD49909AA<br>902A3E3D736CF99AEC0FC6514720</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>http://gvlay6u4g53rxdi5.onion/31-LPy3hdSfGLBgLSfGcKN9rubDKoa1VMK4-dbCnNSAul0fvq3TbbLW6VkdqGEHqT6g2</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open "{{URL}}". <br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected]">[email protected]</a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new mail on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b>Make contact as soon as possible. Your private key (decryption key) <br> is only stored temporarily.<br><br> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Extracted

Path

\Device\HarddiskVolume1\Boot\Recovery_Instructions.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">7555F034449C0E3CE40DD3AECFDB626EEB5A965A5222FB32225AEAF887EE1EC4218230DA1DABD8EF326E3268E1266711394A8A07607823AE490E06CA1C2B7391<br>4E4883274CE414AF79BF55594A92F3AB3E8653E4B411A3C3EFBE2EAB2F1BA33DE1DCDD2FA27A4319EB898719F035F6E15145DB4165876B64E3385CDCD87A<br>8B475FF6CBACD4BE90938AB8FCD1A9156E32667AE91D6542C0B834B642D9ACB71C5DA3C3C09AA67628E4A55690A031237E6C424AF851125CD4E9D4BAD25C<br>E7967BE9B7CAC479B5F4583AE07138F39782D9AC804ACD52D0E75A889665299662113C19485A009FDBD06B0C59645047D51C89A5E6C3E1878C674094598A<br>D0C331D3DF50E81C4705511A0DFA395ECB0098E4E0E770B7A2226D611A1F407C2181BFBE9EB54F5B236A5BB284C57FCF46BFC80F6F2DD88D43E7D308E6D1<br>08D87F0D6B6DD64CD8E31DE18B3CD45C86BCFBFD859E00CD52B23EB5F41E4CC6B96B668FC2B01D5A76C032D24864A4AD8E4AC40100AA2F757553D5BF0FF5<br>8C61BB365D05B9FCC25505972F1A9C9A3F0907A681AAA0C0C1FC023C283642345DEBD50E120FCF0BF7542E962AAC54DA8DD899FFA0A11AFD5025A4CC161D<br>5A1A99E5F9847FD873BCB2D75689181AA3A2DD262DCC20085C5DB244EC71D5A0449D342C35758780EF3B10265A80DD360CEC686885D84F66ACD7B2677E20<br>17F8B4DBC25526B3FDDF86582B56</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>http://gvlay6u4g53rxdi5.onion/31-LPy3hdSfGLBgLSfGcKN9rubDKoa1VMK4-qFGBOwG991yo2gLAcCZAhX2eeDDqZSIg</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open "{{URL}}". <br> 4. Start a chat and follow the further instructions. <br><br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected]">[email protected]</a> <br><a href="[email protected]">[email protected]</a> <br> <b>* To contact us, create a new mail on the site:</b> <a href="https://protonmail.com">protonmail.com<br> <hr> <b>Make contact as soon as possible. Your private key (decryption key) <br> is only stored temporarily.<br><br> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Targets

    • Target

      Neshta.exe

    • Size

      719KB

    • MD5

      8474039d83805eb7b447325c3a8d1ebb

    • SHA1

      a07d537f4253745a087709a9a07c449f84deed8d

    • SHA256

      b2493a580153291b69ca23190d00a00b1220cd0aadf469b3974fdaa726516649

    • SHA512

      3272091bbf123ba5e1592e8b2bd7740cddcb174fa158bc6980b25ee61d92387e94a25284736253f83a6eea78b427f6717e888e843db9d7759cfe9a7676576438

    • SSDEEP

      12288:q4UOTYQivI2qZ7aSgLwkFVpzUvest4ZEbjJLuhJVoM7SPd:bRTYVQ2qZ7aSgLwuVfstRJL6YM6

    • Detect Neshta payload

    • MedusaLocker

      Ransomware with several variants first seen in September 2019.

    • MedusaLocker payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (203) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks