General

  • Target

    DYNAMO.exe

  • Size

    190KB

  • Sample

    241126-kcy2jasrex

  • MD5

    2d3de5e0032cb35ac6a65b8301c9a5cc

  • SHA1

    5010ee7bcb152a510e183eb6d105d925343c5b49

  • SHA256

    474b07d39314c53826ffeb132b78bdcf91fe130fb96de19593ac5ca650ba784a

  • SHA512

    2a2bdba51ed53c13b29a0928072ec6a702ac974da387656a10d6bea1cb81b1f7b4bd267ad97b50b3b837926824fb9815bbbe584dbc6e8d06222a0d7d6d49389e

  • SSDEEP

    3072:sr85CJF2VAzieYNqsjDo9jvvQ1hUpRdRox4jLQAgDZmox4jLQAgDZ7:k9JyeYNqZtHQApRLHnUmHnU7

Malware Config

Targets

    • Target

      DYNAMO.exe

    • Size

      190KB

    • MD5

      2d3de5e0032cb35ac6a65b8301c9a5cc

    • SHA1

      5010ee7bcb152a510e183eb6d105d925343c5b49

    • SHA256

      474b07d39314c53826ffeb132b78bdcf91fe130fb96de19593ac5ca650ba784a

    • SHA512

      2a2bdba51ed53c13b29a0928072ec6a702ac974da387656a10d6bea1cb81b1f7b4bd267ad97b50b3b837926824fb9815bbbe584dbc6e8d06222a0d7d6d49389e

    • SSDEEP

      3072:sr85CJF2VAzieYNqsjDo9jvvQ1hUpRdRox4jLQAgDZmox4jLQAgDZ7:k9JyeYNqZtHQApRLHnUmHnU7

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks