General

  • Target

    tmp/40df6ecd-e54c-493f-bb7f-c90d6862d059_1005.exe

  • Size

    931KB

  • Sample

    211228-fm17esddg5

  • MD5

    eed0c0371cb48c38a359edd1e5e0e7b9

  • SHA1

    f530d7665fc3cf7987d14d61e9517dd4c87e352c

  • SHA256

    96cfda9df4802eb21e020e9c403be26a91a6eb73995913e957fbbac069998959

  • SHA512

    3f8d23829780b58bd9fbfff43ae91215d9900c92b7bac61f51024dc229027d7a15cc91971c4c7911f855b14f7532e86224fc0269e1975a2a31a4616fbf1fe398

Malware Config

Targets

    • Target

      tmp/40df6ecd-e54c-493f-bb7f-c90d6862d059_1005.exe

    • Size

      931KB

    • MD5

      eed0c0371cb48c38a359edd1e5e0e7b9

    • SHA1

      f530d7665fc3cf7987d14d61e9517dd4c87e352c

    • SHA256

      96cfda9df4802eb21e020e9c403be26a91a6eb73995913e957fbbac069998959

    • SHA512

      3f8d23829780b58bd9fbfff43ae91215d9900c92b7bac61f51024dc229027d7a15cc91971c4c7911f855b14f7532e86224fc0269e1975a2a31a4616fbf1fe398

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks