General
-
Target
2024-12-13_c7dbe50a0be47a0c5592f8ec23e89126_makop_neshta
-
Size
90KB
-
Sample
241213-g4ycja1je1
-
MD5
c7dbe50a0be47a0c5592f8ec23e89126
-
SHA1
822e523504367b59aa71c4613e8ea2b4f75ca135
-
SHA256
3f70b5fdede89711449f75f19ee147da0ff23d030c8509964e87448a759d66af
-
SHA512
ba6c57a6ff020318e9b284e48bf40089a644b202e62ddc7badc1ee1563bc07a62674aa90a94c2f5bfdfe24477336a4de71a0b3fa449e81046a49d0ce3f142f64
-
SSDEEP
1536:JxqjQ+P04wsmJCWBYxYUbyCD183dAalnudHyFj6cBSfdYO1:sr85CIYx/PD18endsOcBSfaO1
Behavioral task
behavioral1
Sample
2024-12-13_c7dbe50a0be47a0c5592f8ec23e89126_makop_neshta.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-12-13_c7dbe50a0be47a0c5592f8ec23e89126_makop_neshta.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\+README-WARNING+.txt
Extracted
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\+README-WARNING+.txt
Targets
-
-
Target
2024-12-13_c7dbe50a0be47a0c5592f8ec23e89126_makop_neshta
-
Size
90KB
-
MD5
c7dbe50a0be47a0c5592f8ec23e89126
-
SHA1
822e523504367b59aa71c4613e8ea2b4f75ca135
-
SHA256
3f70b5fdede89711449f75f19ee147da0ff23d030c8509964e87448a759d66af
-
SHA512
ba6c57a6ff020318e9b284e48bf40089a644b202e62ddc7badc1ee1563bc07a62674aa90a94c2f5bfdfe24477336a4de71a0b3fa449e81046a49d0ce3f142f64
-
SSDEEP
1536:JxqjQ+P04wsmJCWBYxYUbyCD183dAalnudHyFj6cBSfdYO1:sr85CIYx/PD18endsOcBSfaO1
-
Detect Neshta payload
-
MAKOP ransomware payload
-
Makop family
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8282) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1