General
-
Target
VenomClient.exe
-
Size
3.8MB
-
Sample
250128-2fwt1swnek
-
MD5
a20d8283361c817cbb9dca6ff939da7c
-
SHA1
c78e2f6b5c98177a95f23ec5aa9f861137e2e129
-
SHA256
6fdddeb45996f7dfbd62d2d30ab84fc026d96b990a7cfbae5dfeacf221dfdd5a
-
SHA512
d05feffa16cc787e7cfbbd1c0619dbb41583726800130c79125c415ad1139fbe9bcd40542172a090a08940265d631d481c36869ca59dfeab808280e7d2292cf9
-
SSDEEP
98304:YkOKCq3dUAcvDPyK1N+HH1mAPMHE+mcgzzKIXlX+JSQuYHuOjwaWfDjxExnDYPGN:YkOKCq3dUAy1NuPMk+mcgzpVX+JSQuY9
Behavioral task
behavioral1
Sample
VenomClient.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
VenomClient.exe
-
Size
3.8MB
-
MD5
a20d8283361c817cbb9dca6ff939da7c
-
SHA1
c78e2f6b5c98177a95f23ec5aa9f861137e2e129
-
SHA256
6fdddeb45996f7dfbd62d2d30ab84fc026d96b990a7cfbae5dfeacf221dfdd5a
-
SHA512
d05feffa16cc787e7cfbbd1c0619dbb41583726800130c79125c415ad1139fbe9bcd40542172a090a08940265d631d481c36869ca59dfeab808280e7d2292cf9
-
SSDEEP
98304:YkOKCq3dUAcvDPyK1N+HH1mAPMHE+mcgzzKIXlX+JSQuYHuOjwaWfDjxExnDYPGN:YkOKCq3dUAy1NuPMk+mcgzpVX+JSQuY9
-
Detect Neshta payload
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Support DLL
-
Elysiumstealer family
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1