General

  • Target

    af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b

  • Size

    6.0MB

  • Sample

    241017-amq4ka1fqc

  • MD5

    3943063d8a8fb69b50caf1acfead34ee

  • SHA1

    25b565a954aa0810ab4472004d30bc4792e1e5f5

  • SHA256

    af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b

  • SHA512

    c690729792cccbda50457d47ba204359fbd4fa6117c47b0169a0aa41c555d2e21ba293458c7ed407c048536b823e0ec959d31128bb4b0c3e6b9208a6e768610f

  • SSDEEP

    98304:c+6ehmwOFcFki+TQlF3Knk7cgEx2fI6y8ZKmQiTVvtH6+25obrcs1028:c+lQwmPiOG3H33I6ypWTVvtaNy228

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    nikitaawp.aiq.ru
  • Port:
    21
  • Username:
    u405447
  • Password:
    wngdce7s

Targets

    • Target

      af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b

    • Size

      6.0MB

    • MD5

      3943063d8a8fb69b50caf1acfead34ee

    • SHA1

      25b565a954aa0810ab4472004d30bc4792e1e5f5

    • SHA256

      af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b

    • SHA512

      c690729792cccbda50457d47ba204359fbd4fa6117c47b0169a0aa41c555d2e21ba293458c7ed407c048536b823e0ec959d31128bb4b0c3e6b9208a6e768610f

    • SSDEEP

      98304:c+6ehmwOFcFki+TQlF3Knk7cgEx2fI6y8ZKmQiTVvtH6+25obrcs1028:c+lQwmPiOG3H33I6ypWTVvtaNy228

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks