General

  • Target

    asdfgtrew.exe

  • Size

    810.6MB

  • Sample

    241015-g43bgszame

  • MD5

    e7bcb3c5f9bac76514648913d592b835

  • SHA1

    4bdfee4f86b94775101ee30162519f4432d6fd66

  • SHA256

    20be2bfafe25515cbc74fb7dca7344948286a01589eaddf8b78331bb1874331b

  • SHA512

    06e71c4acde96647f9c5ffa679997be1218112d039576f3b965826b55f76f2f8cb6d96c1794a2d9e69ff3fcd6babe9a9eac442d088e4d4857cec9d69bc1eb9ea

  • SSDEEP

    24576:j5EHxxiEkkd+S94jg/DsILCrhR0vk/ip9x:jSnisjOas28hRlaR

Malware Config

Targets

    • Target

      asdfgtrew.exe

    • Size

      810.6MB

    • MD5

      e7bcb3c5f9bac76514648913d592b835

    • SHA1

      4bdfee4f86b94775101ee30162519f4432d6fd66

    • SHA256

      20be2bfafe25515cbc74fb7dca7344948286a01589eaddf8b78331bb1874331b

    • SHA512

      06e71c4acde96647f9c5ffa679997be1218112d039576f3b965826b55f76f2f8cb6d96c1794a2d9e69ff3fcd6babe9a9eac442d088e4d4857cec9d69bc1eb9ea

    • SSDEEP

      24576:j5EHxxiEkkd+S94jg/DsILCrhR0vk/ip9x:jSnisjOas28hRlaR

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks