General
-
Target
Proxy.exe
-
Size
2.3MB
-
Sample
241121-kl88vsvmek
-
MD5
c2178d8b3bdcf1210181170012e95b83
-
SHA1
1a6e51b004c5384c0af7882229f6a949395d588a
-
SHA256
1d56622a3c6d280fc8d01051e201e6258265491d08ed387a4910d4663fb707a1
-
SHA512
c99ca875c22893d98bbb11fd70eacbad3e180e78f55abc9421db350db91c58428b52398678db0ccbfe9942ce9bf2775a61af9f1d709ca87c7f08c8b62c45fa5a
-
SSDEEP
24576:dFbkIsaPiXSVnC7Yp9zkNmZG8RRln4yzrIila8CfcX50Kew+IVWQPYwKBdzuyMrt:dREXSVMDi3w0aFIP+DwKnwhFltZ
Behavioral task
behavioral1
Sample
Proxy.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Proxy.exe
-
Size
2.3MB
-
MD5
c2178d8b3bdcf1210181170012e95b83
-
SHA1
1a6e51b004c5384c0af7882229f6a949395d588a
-
SHA256
1d56622a3c6d280fc8d01051e201e6258265491d08ed387a4910d4663fb707a1
-
SHA512
c99ca875c22893d98bbb11fd70eacbad3e180e78f55abc9421db350db91c58428b52398678db0ccbfe9942ce9bf2775a61af9f1d709ca87c7f08c8b62c45fa5a
-
SSDEEP
24576:dFbkIsaPiXSVnC7Yp9zkNmZG8RRln4yzrIila8CfcX50Kew+IVWQPYwKBdzuyMrt:dREXSVMDi3w0aFIP+DwKnwhFltZ
-
Detect Neshta payload
-
Gh0st RAT payload
-
Gh0strat family
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Server Software Component: Terminal Services DLL
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Change Default File Association
1Server Software Component
1Terminal Services DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1