General

  • Target

    2025-01-21_92c84a434536f532fb4f7b1fc9dec651_darkside_neshta

  • Size

    3.4MB

  • Sample

    250121-cb3pbszpfn

  • MD5

    92c84a434536f532fb4f7b1fc9dec651

  • SHA1

    5bd1e6f07a7de5e18701531f9cfc0efea3eb99fa

  • SHA256

    ad1a1b98784100c98dc220ca9fc8ef71ed5207f4dbb42db58d910c23300da98c

  • SHA512

    666676cf23702840aa2f5f762cbe4d92e68fe342ab7eda8eaa62ce84c1e13f1f233a4b60c41b58785852fce380a83ab2b3b4d5556bb761f11adaa9757f01da2f

  • SSDEEP

    6144:k9Dc4m9tDm7myGq2S9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9NB:h4CDmO

Malware Config

Targets

    • Target

      2025-01-21_92c84a434536f532fb4f7b1fc9dec651_darkside_neshta

    • Size

      3.4MB

    • MD5

      92c84a434536f532fb4f7b1fc9dec651

    • SHA1

      5bd1e6f07a7de5e18701531f9cfc0efea3eb99fa

    • SHA256

      ad1a1b98784100c98dc220ca9fc8ef71ed5207f4dbb42db58d910c23300da98c

    • SHA512

      666676cf23702840aa2f5f762cbe4d92e68fe342ab7eda8eaa62ce84c1e13f1f233a4b60c41b58785852fce380a83ab2b3b4d5556bb761f11adaa9757f01da2f

    • SSDEEP

      6144:k9Dc4m9tDm7myGq2S9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9NB:h4CDmO

    • Detect Neshta payload

    • Lockbit

      Ransomware family with multiple variants released since late 2019.

    • Lockbit family

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Rule to detect Lockbit 3.0 ransomware Windows payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks