General

  • Target

    fb51de4a5a6e5ce3ecfba2871eccd0d3cc201619008cdbe808b8b250bdcedeb6

  • Size

    4.4MB

  • Sample

    220131-11qytscffk

  • MD5

    1e1b0f9d930f5fb46678b987b33f7f13

  • SHA1

    0feed2b32acd1661aedd4c9831ea748b4e3901da

  • SHA256

    fb51de4a5a6e5ce3ecfba2871eccd0d3cc201619008cdbe808b8b250bdcedeb6

  • SHA512

    d0c2ebf4593c7cf29a5bd806d0eacc7568bf4e66a212fd083bd604628e0a609a02bc25f1489b80338c84db969086618d34630371fc2dfab7e32d2ed9c391baeb

Malware Config

Targets

    • Target

      fb51de4a5a6e5ce3ecfba2871eccd0d3cc201619008cdbe808b8b250bdcedeb6

    • Size

      4.4MB

    • MD5

      1e1b0f9d930f5fb46678b987b33f7f13

    • SHA1

      0feed2b32acd1661aedd4c9831ea748b4e3901da

    • SHA256

      fb51de4a5a6e5ce3ecfba2871eccd0d3cc201619008cdbe808b8b250bdcedeb6

    • SHA512

      d0c2ebf4593c7cf29a5bd806d0eacc7568bf4e66a212fd083bd604628e0a609a02bc25f1489b80338c84db969086618d34630371fc2dfab7e32d2ed9c391baeb

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks