General

  • Target

    f9629746167c524d7cc3e9c5b4d3b0fa36328dc45e58a544a05116f31abe758eN.exe

  • Size

    918KB

  • Sample

    241216-thlstsvkaw

  • MD5

    1d27999acfcb8c914369b50caf892cc0

  • SHA1

    21e4fe1ece628822ec7bd578fa2fa82152cdd5ba

  • SHA256

    f9629746167c524d7cc3e9c5b4d3b0fa36328dc45e58a544a05116f31abe758e

  • SHA512

    dd624551465768d3bef4d9b1d0eb1e3afce9d2eca6e23e52a62a8d0a39c5b61d59fb0e9ce022b7d2d3b36a3cd79093c825d1f5877ac75801bcce35304671a5ad

  • SSDEEP

    12288:0WDHzqGhX888888888888W88888888888pVHCxyIPfgFw/ktXoDXpz8WNlw7IK7f:0WbzqSL9CdAw3DXpTlwEKozienev

Malware Config

Targets

    • Target

      f9629746167c524d7cc3e9c5b4d3b0fa36328dc45e58a544a05116f31abe758eN.exe

    • Size

      918KB

    • MD5

      1d27999acfcb8c914369b50caf892cc0

    • SHA1

      21e4fe1ece628822ec7bd578fa2fa82152cdd5ba

    • SHA256

      f9629746167c524d7cc3e9c5b4d3b0fa36328dc45e58a544a05116f31abe758e

    • SHA512

      dd624551465768d3bef4d9b1d0eb1e3afce9d2eca6e23e52a62a8d0a39c5b61d59fb0e9ce022b7d2d3b36a3cd79093c825d1f5877ac75801bcce35304671a5ad

    • SSDEEP

      12288:0WDHzqGhX888888888888W88888888888pVHCxyIPfgFw/ktXoDXpz8WNlw7IK7f:0WbzqSL9CdAw3DXpTlwEKozienev

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks