General

  • Target

    2025-04-21_9331287b6cf7962736f833a4fb95fa72_elex_neshta_rhysida

  • Size

    459KB

  • Sample

    250421-mxy85svlv5

  • MD5

    9331287b6cf7962736f833a4fb95fa72

  • SHA1

    f67c7cd2526b804e744e9e383e8ff14b0a791011

  • SHA256

    cc1d720d5da2885c50cd93547ccf8163d7b4bb7511c7f5756e4798e449306c53

  • SHA512

    2fee0cf116b194e0695a2ce5df45bb29f7567538d7c8674749ab2a72ec55e10b482746b11ab90582498c99335fbe7bf727ac40089fbab0540a38373c41d86825

  • SSDEEP

    6144:k97+QbqZ0/xDPK8JLM7hsqMFUtkko1mJ8+ANqTCOQ7bSLP:cmQx71M75tzOmJ8+5

Malware Config

Targets

    • Target

      2025-04-21_9331287b6cf7962736f833a4fb95fa72_elex_neshta_rhysida

    • Size

      459KB

    • MD5

      9331287b6cf7962736f833a4fb95fa72

    • SHA1

      f67c7cd2526b804e744e9e383e8ff14b0a791011

    • SHA256

      cc1d720d5da2885c50cd93547ccf8163d7b4bb7511c7f5756e4798e449306c53

    • SHA512

      2fee0cf116b194e0695a2ce5df45bb29f7567538d7c8674749ab2a72ec55e10b482746b11ab90582498c99335fbe7bf727ac40089fbab0540a38373c41d86825

    • SSDEEP

      6144:k97+QbqZ0/xDPK8JLM7hsqMFUtkko1mJ8+ANqTCOQ7bSLP:cmQx71M75tzOmJ8+5

    • Detect Neshta payload

    • Detect Rhysida ransomware

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Rhysida

      Rhysida is a ransomware that is written in C++ and discovered in 2023.

    • Rhysida family

    • Renames multiple (2593) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Executes dropped EXE

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v16

Tasks