General

  • Target

    aec8415d0972e902d53d348ebc7beaf6c575f9ec6e12791173ab1d84e90a1109.exe

  • Size

    789KB

  • Sample

    240417-rspalabh67

  • MD5

    5d84f160cec1c7b8e83d6d9f90a612f0

  • SHA1

    58f2e9216d4b29073376f6f607c16d03ba1c200f

  • SHA256

    aec8415d0972e902d53d348ebc7beaf6c575f9ec6e12791173ab1d84e90a1109

  • SHA512

    fd2c641a4d4a244b77ad0ce8870958fa05bf766bba65c08e0cabfd652d12e43367dfeb9ee2969e74fd95658a10d015738a6449f3da1f4148d953163c5ff4ccb7

  • SSDEEP

    12288:0YdNBRpXKLo9hkHttxOpoyk2/VA1kzxFrTffQ/CvaY3D6o3Jotq4xzVtf4Bbro:9dNnpa4kNRI/VtXffjTFsVd4Br

Malware Config

Targets

    • Target

      aec8415d0972e902d53d348ebc7beaf6c575f9ec6e12791173ab1d84e90a1109.exe

    • Size

      789KB

    • MD5

      5d84f160cec1c7b8e83d6d9f90a612f0

    • SHA1

      58f2e9216d4b29073376f6f607c16d03ba1c200f

    • SHA256

      aec8415d0972e902d53d348ebc7beaf6c575f9ec6e12791173ab1d84e90a1109

    • SHA512

      fd2c641a4d4a244b77ad0ce8870958fa05bf766bba65c08e0cabfd652d12e43367dfeb9ee2969e74fd95658a10d015738a6449f3da1f4148d953163c5ff4ccb7

    • SSDEEP

      12288:0YdNBRpXKLo9hkHttxOpoyk2/VA1kzxFrTffQ/CvaY3D6o3Jotq4xzVtf4Bbro:9dNnpa4kNRI/VtXffjTFsVd4Br

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks