General
-
Target
2025-04-21_9331287b6cf7962736f833a4fb95fa72_elex_neshta_rhysida
-
Size
459KB
-
Sample
250421-mxy85svlv5
-
MD5
9331287b6cf7962736f833a4fb95fa72
-
SHA1
f67c7cd2526b804e744e9e383e8ff14b0a791011
-
SHA256
cc1d720d5da2885c50cd93547ccf8163d7b4bb7511c7f5756e4798e449306c53
-
SHA512
2fee0cf116b194e0695a2ce5df45bb29f7567538d7c8674749ab2a72ec55e10b482746b11ab90582498c99335fbe7bf727ac40089fbab0540a38373c41d86825
-
SSDEEP
6144:k97+QbqZ0/xDPK8JLM7hsqMFUtkko1mJ8+ANqTCOQ7bSLP:cmQx71M75tzOmJ8+5
Behavioral task
behavioral1
Sample
2025-04-21_9331287b6cf7962736f833a4fb95fa72_elex_neshta_rhysida.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-21_9331287b6cf7962736f833a4fb95fa72_elex_neshta_rhysida.exe
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
2025-04-21_9331287b6cf7962736f833a4fb95fa72_elex_neshta_rhysida
-
Size
459KB
-
MD5
9331287b6cf7962736f833a4fb95fa72
-
SHA1
f67c7cd2526b804e744e9e383e8ff14b0a791011
-
SHA256
cc1d720d5da2885c50cd93547ccf8163d7b4bb7511c7f5756e4798e449306c53
-
SHA512
2fee0cf116b194e0695a2ce5df45bb29f7567538d7c8674749ab2a72ec55e10b482746b11ab90582498c99335fbe7bf727ac40089fbab0540a38373c41d86825
-
SSDEEP
6144:k97+QbqZ0/xDPK8JLM7hsqMFUtkko1mJ8+ANqTCOQ7bSLP:cmQx71M75tzOmJ8+5
-
Detect Neshta payload
-
Detect Rhysida ransomware
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Rhysida family
-
Renames multiple (2593) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Modifies system executable filetype association
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v16
Defense Evasion
Hide Artifacts
2Hidden Window
1Ignore Process Interrupts
1Indicator Removal
1File Deletion
1Modify Registry
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1