General

  • Target

    NLORG-MasterRDP.zip

  • Size

    2.5MB

  • Sample

    250214-w5564axjas

  • MD5

    833a2f56f35ae582bdfbf49f265dcfc3

  • SHA1

    bf063ddebf6c1429114a0db80c64e0dba3d655a2

  • SHA256

    b01cccb830d97e6b2c9eef1eee84993dfda404fb5a7c9bcdd95d9d3f25f0cfe9

  • SHA512

    36f728dc7c92d211915b08ded55e1973da500b99a0b29842bec91a2f74ea3c520db0342a5fbad46d89e8a5a2ddf56c3e0bd83a3dd207a49582b71128b6ec64bc

  • SSDEEP

    49152:XH/Jev9V1ZFPsXkERNkamWmLxm6HwurcU4pEyfagxbybJeQdthmLcpoYK8e7GB78:BiZFePNkjW0xdwC3K7Co2JltRGF8dVVK

Malware Config

Targets

    • Target

      Keygen.exe

    • Size

      2.5MB

    • MD5

      e72838eccda2eae29e96b0c572d783c3

    • SHA1

      60f0944ecbd21cf590445c12ba89a2ae48f27a6a

    • SHA256

      f824fdc666630ccb179d9086b79783e3ede76e4392a5edfdd20d93b7259ae061

    • SHA512

      7439902a4f16d29dcc4c749adc40f4541d509e607d915287c6c98f609ef14c4eb99ec507d7e7c853527a6c08628a367b21ae0f066828c2cc8792f2c1a3fa77f8

    • SSDEEP

      49152:IJdf39XFINkWr5kkYe6TdOYz44rcaMJIsjOO/ry3X0EdNZgJAxGEG8CZaFDG5UN:q9XaH5kheKdX4cjuR6q6XTNTI58ZTN

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks