General

  • Target

    b478f1b81364b8498b6ee8779593f2e2b41fa987261abf359c2e1daefbb7a2b4

  • Size

    208KB

  • Sample

    220122-bbfn5afgh4

  • MD5

    efa3b342a50f336062d2bd7f06103965

  • SHA1

    d2cd5c11dfcec8b8d642b53a7fe8203dcae09bd6

  • SHA256

    b478f1b81364b8498b6ee8779593f2e2b41fa987261abf359c2e1daefbb7a2b4

  • SHA512

    477fbc42737960b986557901f93054b1bfbc2d049fbd36294d83b880c6d3cc033a3c0fa94953359fedf8e068be14ad6fb1aca76870c6e7c776e056c321c751d7

Malware Config

Targets

    • Target

      b478f1b81364b8498b6ee8779593f2e2b41fa987261abf359c2e1daefbb7a2b4

    • Size

      208KB

    • MD5

      efa3b342a50f336062d2bd7f06103965

    • SHA1

      d2cd5c11dfcec8b8d642b53a7fe8203dcae09bd6

    • SHA256

      b478f1b81364b8498b6ee8779593f2e2b41fa987261abf359c2e1daefbb7a2b4

    • SHA512

      477fbc42737960b986557901f93054b1bfbc2d049fbd36294d83b880c6d3cc033a3c0fa94953359fedf8e068be14ad6fb1aca76870c6e7c776e056c321c751d7

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

4
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks