General

  • Target

    daa5fbc7355c6586aaf420a8c1b2e989.exe

  • Size

    516KB

  • Sample

    211130-h94beahdc5

  • MD5

    daa5fbc7355c6586aaf420a8c1b2e989

  • SHA1

    c9554309b0266c41bd945f43c74da5139994ef17

  • SHA256

    d48ba61686bed9bcd76c92cca9e720d9afd6695b4ac2e62b5772af8367fff20f

  • SHA512

    64ced6fcc04cb810105d7782db0582b4588092499da18787135073cc069f448e6482938006f1e60cac3289febce52e8be085e3e313795772be5cad79582f805c

Malware Config

Targets

    • Target

      daa5fbc7355c6586aaf420a8c1b2e989.exe

    • Size

      516KB

    • MD5

      daa5fbc7355c6586aaf420a8c1b2e989

    • SHA1

      c9554309b0266c41bd945f43c74da5139994ef17

    • SHA256

      d48ba61686bed9bcd76c92cca9e720d9afd6695b4ac2e62b5772af8367fff20f

    • SHA512

      64ced6fcc04cb810105d7782db0582b4588092499da18787135073cc069f448e6482938006f1e60cac3289febce52e8be085e3e313795772be5cad79582f805c

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Change Default File Association

1
T1042

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks