General

  • Target

    VenomClient.exe

  • Size

    3.8MB

  • Sample

    250128-2fwt1swnek

  • MD5

    a20d8283361c817cbb9dca6ff939da7c

  • SHA1

    c78e2f6b5c98177a95f23ec5aa9f861137e2e129

  • SHA256

    6fdddeb45996f7dfbd62d2d30ab84fc026d96b990a7cfbae5dfeacf221dfdd5a

  • SHA512

    d05feffa16cc787e7cfbbd1c0619dbb41583726800130c79125c415ad1139fbe9bcd40542172a090a08940265d631d481c36869ca59dfeab808280e7d2292cf9

  • SSDEEP

    98304:YkOKCq3dUAcvDPyK1N+HH1mAPMHE+mcgzzKIXlX+JSQuYHuOjwaWfDjxExnDYPGN:YkOKCq3dUAy1NuPMk+mcgzpVX+JSQuY9

Malware Config

Targets

    • Target

      VenomClient.exe

    • Size

      3.8MB

    • MD5

      a20d8283361c817cbb9dca6ff939da7c

    • SHA1

      c78e2f6b5c98177a95f23ec5aa9f861137e2e129

    • SHA256

      6fdddeb45996f7dfbd62d2d30ab84fc026d96b990a7cfbae5dfeacf221dfdd5a

    • SHA512

      d05feffa16cc787e7cfbbd1c0619dbb41583726800130c79125c415ad1139fbe9bcd40542172a090a08940265d631d481c36869ca59dfeab808280e7d2292cf9

    • SSDEEP

      98304:YkOKCq3dUAcvDPyK1N+HH1mAPMHE+mcgzzKIXlX+JSQuYHuOjwaWfDjxExnDYPGN:YkOKCq3dUAy1NuPMk+mcgzpVX+JSQuY9

    • Detect Neshta payload

    • ElysiumStealer

      ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

    • ElysiumStealer Support DLL

    • Elysiumstealer family

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks