General

  • Target

    BestNLBrute.zip

  • Size

    7.5MB

  • Sample

    250213-rzsxcsyphm

  • MD5

    8f7b9fd8bc2ac4f7b2a806e5c1fe166c

  • SHA1

    3dd8cf658c17def0377baabfd473037a264c3fd5

  • SHA256

    11179c34425fcd0dcf122f89e74ea745212772280013f570979302acff40266e

  • SHA512

    d7714bc8ae279e17683d555aabb5d6e0174a61d73d57108ff09bf8ab4d093fa0cfea6e552fbde5f84dfe9e51fd9f2abfb708515b1026e0f03d67fc3bd9cb4c05

  • SSDEEP

    196608:fO60xdddo2FMWdVVRj81QcOhvoG0m1cOwoUJGh90lDHB3J:fOl/opWd181QcOhvDbfiGodT

Malware Config

Targets

    • Target

      BestNLBrute.zip

    • Size

      7.5MB

    • MD5

      8f7b9fd8bc2ac4f7b2a806e5c1fe166c

    • SHA1

      3dd8cf658c17def0377baabfd473037a264c3fd5

    • SHA256

      11179c34425fcd0dcf122f89e74ea745212772280013f570979302acff40266e

    • SHA512

      d7714bc8ae279e17683d555aabb5d6e0174a61d73d57108ff09bf8ab4d093fa0cfea6e552fbde5f84dfe9e51fd9f2abfb708515b1026e0f03d67fc3bd9cb4c05

    • SSDEEP

      196608:fO60xdddo2FMWdVVRj81QcOhvoG0m1cOwoUJGh90lDHB3J:fOl/opWd181QcOhvDbfiGodT

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • System Binary Proxy Execution: Verclsid

      Adversaries may abuse Verclsid to proxy execution of malicious code.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks