General

  • Target

    c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N

  • Size

    570KB

  • Sample

    241105-n2rkjasrep

  • MD5

    4767f83ca3ff9905cf4dcac847630e50

  • SHA1

    f9f14f1c80643ca3d7317a7c02c06a9c0bcfa18d

  • SHA256

    c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9

  • SHA512

    0547c48f60bc64f1fc4c96c51e657e09d7b89453c81cdd07f46fd06c37895c67b4156c3bfabc4c67b52e714dbc76fc98e34382063029151a724bf3ee1a2ad24c

  • SSDEEP

    12288:WCLNPL2KestvAeMUbhJlHrfrIf74NCpfUo9ExtytEwEh:WC1L2U5AGLrIf0YExwtmh

Malware Config

Targets

    • Target

      c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9N

    • Size

      570KB

    • MD5

      4767f83ca3ff9905cf4dcac847630e50

    • SHA1

      f9f14f1c80643ca3d7317a7c02c06a9c0bcfa18d

    • SHA256

      c242bdd7350afc95fdfabc309744db405c3a16849340fb978bfd428da6bfb7d9

    • SHA512

      0547c48f60bc64f1fc4c96c51e657e09d7b89453c81cdd07f46fd06c37895c67b4156c3bfabc4c67b52e714dbc76fc98e34382063029151a724bf3ee1a2ad24c

    • SSDEEP

      12288:WCLNPL2KestvAeMUbhJlHrfrIf74NCpfUo9ExtytEwEh:WC1L2U5AGLrIf0YExwtmh

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks