General
-
Target
ebf1e8bec9281398e97b9b429cb6ef8648814bd3ce3b8f11fecce49cd670c0b1
-
Size
193KB
-
Sample
250109-maqcqayrbl
-
MD5
740e69b7e2d963fe56a6bd04f90cd4a1
-
SHA1
f092b3b6f3eb1497c38f4691d9811d9faed3142e
-
SHA256
ebf1e8bec9281398e97b9b429cb6ef8648814bd3ce3b8f11fecce49cd670c0b1
-
SHA512
175c10cb1632c158ff82e1a841066e4cda13dd322e6831088edf165e5866cf8dee99e06c387f1181b97c8857d0c7409b000503491bb9bbae9215e3e83682f9df
-
SSDEEP
3072:rr89cCR5iD0HZI0P7XhBL4nZSVW7kO/HdqQU1Dpv5tFA25ZA1J6Ho5:nIZTfZxTRB0gW1/9y9pvrlA1r5
Behavioral task
behavioral1
Sample
ebf1e8bec9281398e97b9b429cb6ef8648814bd3ce3b8f11fecce49cd670c0b1.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Targets
-
-
Target
ebf1e8bec9281398e97b9b429cb6ef8648814bd3ce3b8f11fecce49cd670c0b1
-
Size
193KB
-
MD5
740e69b7e2d963fe56a6bd04f90cd4a1
-
SHA1
f092b3b6f3eb1497c38f4691d9811d9faed3142e
-
SHA256
ebf1e8bec9281398e97b9b429cb6ef8648814bd3ce3b8f11fecce49cd670c0b1
-
SHA512
175c10cb1632c158ff82e1a841066e4cda13dd322e6831088edf165e5866cf8dee99e06c387f1181b97c8857d0c7409b000503491bb9bbae9215e3e83682f9df
-
SSDEEP
3072:rr89cCR5iD0HZI0P7XhBL4nZSVW7kO/HdqQU1Dpv5tFA25ZA1J6Ho5:nIZTfZxTRB0gW1/9y9pvrlA1r5
-
Detect Neshta payload
-
Modifies firewall policy service
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1