General

  • Target

    tmp/25e4a379-87a3-4697-9bf3-405c7ea1233b_1013.exe

  • Size

    971KB

  • Sample

    211228-m32apadgc5

  • MD5

    0f09c21dda0c397d72e388d46f03e777

  • SHA1

    44c93d3f5e021a2c736f3b29e94342c1404fa549

  • SHA256

    6afc05e16f34327163a5576483ec7a3c56ba26c762648b9b9261901382af4a65

  • SHA512

    5af85c92b890bd7973938e683fda4097d72d220d5a3ba14d95592ce07ba118d09597d7539e6e3f9ed92ada5d136a942bdec061e057fb155276d294cc913213c4

Malware Config

Targets

    • Target

      tmp/25e4a379-87a3-4697-9bf3-405c7ea1233b_1013.exe

    • Size

      971KB

    • MD5

      0f09c21dda0c397d72e388d46f03e777

    • SHA1

      44c93d3f5e021a2c736f3b29e94342c1404fa549

    • SHA256

      6afc05e16f34327163a5576483ec7a3c56ba26c762648b9b9261901382af4a65

    • SHA512

      5af85c92b890bd7973938e683fda4097d72d220d5a3ba14d95592ce07ba118d09597d7539e6e3f9ed92ada5d136a942bdec061e057fb155276d294cc913213c4

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks