General

  • Target

    e593236ed9903c8ba7fbbc9fed15bfd60a7e591cd27f0ba815a1fd1a9aab74bc

  • Size

    1.9MB

  • Sample

    240705-el979ssckn

  • MD5

    53f14218153b3ccb3e55fb6220cfc2ef

  • SHA1

    44c836fa1837f4ee85b076d99050c137501cf345

  • SHA256

    e593236ed9903c8ba7fbbc9fed15bfd60a7e591cd27f0ba815a1fd1a9aab74bc

  • SHA512

    2e3d91b1f4e89df9ebadd2e18fd0a90b6f95bcdfe21e120ad0d4ad0d75a9fef8facfc3a7414fbc8a647d4594ce581e0932a84b93984a8e3c9204dd54729f507d

  • SSDEEP

    49152:Rw2PjCSK6Q70zKaOF0RBl0Id/oz5nxTeYuc9t2:aoBWIA5nxjF9t2

Malware Config

Targets

    • Target

      e593236ed9903c8ba7fbbc9fed15bfd60a7e591cd27f0ba815a1fd1a9aab74bc

    • Size

      1.9MB

    • MD5

      53f14218153b3ccb3e55fb6220cfc2ef

    • SHA1

      44c836fa1837f4ee85b076d99050c137501cf345

    • SHA256

      e593236ed9903c8ba7fbbc9fed15bfd60a7e591cd27f0ba815a1fd1a9aab74bc

    • SHA512

      2e3d91b1f4e89df9ebadd2e18fd0a90b6f95bcdfe21e120ad0d4ad0d75a9fef8facfc3a7414fbc8a647d4594ce581e0932a84b93984a8e3c9204dd54729f507d

    • SSDEEP

      49152:Rw2PjCSK6Q70zKaOF0RBl0Id/oz5nxTeYuc9t2:aoBWIA5nxjF9t2

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • PredatorStealer

      Predator is a modular stealer written in C#.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks