General

  • Target

    9b21559375eca8376cb62e8f0c8b4b04ef63a540601accff2ad95222e6068d70N.exe

  • Size

    4.1MB

  • Sample

    241117-lk7t3sxcmp

  • MD5

    455cdf360d148084a3462388a0372220

  • SHA1

    7042850375ae604ac615baf75f4e04d39d1e92b0

  • SHA256

    9b21559375eca8376cb62e8f0c8b4b04ef63a540601accff2ad95222e6068d70

  • SHA512

    feaed691c4e6a96bb2661e65b136432257dc9756b81be7190bf34e0b8aff5f7aca8f90b2891e89f5e0a5d3c8ca574cbe0ef1aa9e31832cec6b491f2aab404bd3

  • SSDEEP

    49152:cGB9AJ9MtZNnbUeRA19dp9EceNO8nsFac8WrgMR6oym8E02CO8Ff5AB3Od7rJoLi:xeqceNGmRo/ZKk848

Malware Config

Targets

    • Target

      9b21559375eca8376cb62e8f0c8b4b04ef63a540601accff2ad95222e6068d70N.exe

    • Size

      4.1MB

    • MD5

      455cdf360d148084a3462388a0372220

    • SHA1

      7042850375ae604ac615baf75f4e04d39d1e92b0

    • SHA256

      9b21559375eca8376cb62e8f0c8b4b04ef63a540601accff2ad95222e6068d70

    • SHA512

      feaed691c4e6a96bb2661e65b136432257dc9756b81be7190bf34e0b8aff5f7aca8f90b2891e89f5e0a5d3c8ca574cbe0ef1aa9e31832cec6b491f2aab404bd3

    • SSDEEP

      49152:cGB9AJ9MtZNnbUeRA19dp9EceNO8nsFac8WrgMR6oym8E02CO8Ff5AB3Od7rJoLi:xeqceNGmRo/ZKk848

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks