General

  • Target

    Proxy.exe

  • Size

    2.3MB

  • Sample

    241121-kl88vsvmek

  • MD5

    c2178d8b3bdcf1210181170012e95b83

  • SHA1

    1a6e51b004c5384c0af7882229f6a949395d588a

  • SHA256

    1d56622a3c6d280fc8d01051e201e6258265491d08ed387a4910d4663fb707a1

  • SHA512

    c99ca875c22893d98bbb11fd70eacbad3e180e78f55abc9421db350db91c58428b52398678db0ccbfe9942ce9bf2775a61af9f1d709ca87c7f08c8b62c45fa5a

  • SSDEEP

    24576:dFbkIsaPiXSVnC7Yp9zkNmZG8RRln4yzrIila8CfcX50Kew+IVWQPYwKBdzuyMrt:dREXSVMDi3w0aFIP+DwKnwhFltZ

Malware Config

Targets

    • Target

      Proxy.exe

    • Size

      2.3MB

    • MD5

      c2178d8b3bdcf1210181170012e95b83

    • SHA1

      1a6e51b004c5384c0af7882229f6a949395d588a

    • SHA256

      1d56622a3c6d280fc8d01051e201e6258265491d08ed387a4910d4663fb707a1

    • SHA512

      c99ca875c22893d98bbb11fd70eacbad3e180e78f55abc9421db350db91c58428b52398678db0ccbfe9942ce9bf2775a61af9f1d709ca87c7f08c8b62c45fa5a

    • SSDEEP

      24576:dFbkIsaPiXSVnC7Yp9zkNmZG8RRln4yzrIila8CfcX50Kew+IVWQPYwKBdzuyMrt:dREXSVMDi3w0aFIP+DwKnwhFltZ

    • Detect Neshta payload

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Server Software Component: Terminal Services DLL

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks