General
-
Target
2024-11-24_cafbacc31cdd3ecece60d7128cf8bc90_globeimposter_neshta
-
Size
93KB
-
Sample
241124-q4dgsssla1
-
MD5
cafbacc31cdd3ecece60d7128cf8bc90
-
SHA1
ab73f8a73bf1df39143e55e0c49a61238bf6cbca
-
SHA256
58a4ab673e72f1ea429d520a6d204ab43e6e3539ecd124b197ec92d50cb8079e
-
SHA512
2d3a20a496abd456b5732d8a119cc3b73bbd5bdaf7c79943c7c6c7a98254c0f6a2b017acc75ff894e06086206734841e740b1b47a864c0b1a2935c692d0457fc
-
SSDEEP
1536:JxqjQ+P04wsmJC5LpeytM3alnawrRIwxVSHMweio:sr85C5Lpey23alnaEIN/
Behavioral task
behavioral1
Sample
2024-11-24_cafbacc31cdd3ecece60d7128cf8bc90_globeimposter_neshta.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-24_cafbacc31cdd3ecece60d7128cf8bc90_globeimposter_neshta.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Public\Music\Sample Music\how_to_back_files.html
Extracted
C:\ProgramData\regid.1991-06.com.microsoft\how_to_back_files.html
Targets
-
-
Target
2024-11-24_cafbacc31cdd3ecece60d7128cf8bc90_globeimposter_neshta
-
Size
93KB
-
MD5
cafbacc31cdd3ecece60d7128cf8bc90
-
SHA1
ab73f8a73bf1df39143e55e0c49a61238bf6cbca
-
SHA256
58a4ab673e72f1ea429d520a6d204ab43e6e3539ecd124b197ec92d50cb8079e
-
SHA512
2d3a20a496abd456b5732d8a119cc3b73bbd5bdaf7c79943c7c6c7a98254c0f6a2b017acc75ff894e06086206734841e740b1b47a864c0b1a2935c692d0457fc
-
SSDEEP
1536:JxqjQ+P04wsmJC5LpeytM3alnawrRIwxVSHMweio:sr85C5Lpey23alnaEIN/
-
Detect Neshta payload
-
Globeimposter family
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Renames multiple (7527) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1