General

  • Target

    b81ebbf80b7d08706abef17034eaf5ef28b642acb41bf972f1ade452ff741f30

  • Size

    359KB

  • Sample

    240417-p242asfh34

  • MD5

    ba1dbac17a0073abc69ab6082c7941a8

  • SHA1

    d4cfb8cd04c78a53b72869011bd3a81dde2d0772

  • SHA256

    b81ebbf80b7d08706abef17034eaf5ef28b642acb41bf972f1ade452ff741f30

  • SHA512

    cbfb200acbb59baed1678c8075b323ea726a10264a7fc24b4d1b1623d33eb0aadf7cae78b2286949bf8fedc20573c42d6c2dab30eabe0f670c369036538ca4fc

  • SSDEEP

    6144:8cQEdUl27EOHs+5bKz1d/4WQjfolYn1/vJGa7CXnzRpHPqNtvAUEsK9:XQKUSEOH1CwsYdJijvSNtJu9

Malware Config

Targets

    • Target

      d4ff62f78b546c2e181f819abc1f17736ba27c6630118f6d6f772b7d34d5334d.exe

    • Size

      804KB

    • MD5

      daf5ddf2a53dde0a2398973fc6ac93e0

    • SHA1

      a225fec587cb4763eba40943c88396a86e74c6c4

    • SHA256

      d4ff62f78b546c2e181f819abc1f17736ba27c6630118f6d6f772b7d34d5334d

    • SHA512

      19d4ed705cb2550c9a5bf6f8ca0c5800c166ee20a64a401eff46b284c39ed5a8b1ed6838513379c60eae18d53e0d7e4dc0f43857b815c9c138664f6dd5bf738c

    • SSDEEP

      12288:zENN+T5xYrllrU7QY6/5xYrllrU7QY6vaLo3K3ahaMcqDJXKuJUsENN+7:Z5xolYQY6/5xolYQY6UomahakN6uJUs

    • Detect Neshta payload

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Modifies Installed Components in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

5
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks