General
-
Target
80e642dd7e4230a29731756515022aa2c5ec2324d0205fd6eb0d86b96a08f060
-
Size
2.5MB
-
Sample
250109-dsb4dawkfs
-
MD5
7d34fda9c89105cfd5c99260061b0642
-
SHA1
b0249486724a6777cec133bb3818900378fec31c
-
SHA256
80e642dd7e4230a29731756515022aa2c5ec2324d0205fd6eb0d86b96a08f060
-
SHA512
574aca7696402594c44180f24352b7ce5258a58879ac7a795bac0f4a5c3b73f15fcba7f6b04c7119b15107dffec076ab25dfc95d3630e1c7e5301c492667b7b1
-
SSDEEP
49152:crenjNJBfl7UGDxNug/EQ85aaKAdtl0Wf+:0eD7XV+9asT+
Behavioral task
behavioral1
Sample
80e642dd7e4230a29731756515022aa2c5ec2324d0205fd6eb0d86b96a08f060.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Targets
-
-
Target
80e642dd7e4230a29731756515022aa2c5ec2324d0205fd6eb0d86b96a08f060
-
Size
2.5MB
-
MD5
7d34fda9c89105cfd5c99260061b0642
-
SHA1
b0249486724a6777cec133bb3818900378fec31c
-
SHA256
80e642dd7e4230a29731756515022aa2c5ec2324d0205fd6eb0d86b96a08f060
-
SHA512
574aca7696402594c44180f24352b7ce5258a58879ac7a795bac0f4a5c3b73f15fcba7f6b04c7119b15107dffec076ab25dfc95d3630e1c7e5301c492667b7b1
-
SSDEEP
49152:crenjNJBfl7UGDxNug/EQ85aaKAdtl0Wf+:0eD7XV+9asT+
-
Detect Neshta payload
-
Modifies firewall policy service
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1