General

  • Target

    4a72325c4b02a7766c3704a21a6852ec020a2cdcea921cebbe09ce4ed1ee8021

  • Size

    2.9MB

  • Sample

    220201-qd3c8sdfb2

  • MD5

    7ff0209df97c2298170ced643485f3c8

  • SHA1

    f78379a5aa3641e38079649f78b29b7aefe1adc3

  • SHA256

    4a72325c4b02a7766c3704a21a6852ec020a2cdcea921cebbe09ce4ed1ee8021

  • SHA512

    9ab6bfbd3c6533b3c11e35955a71913ec7bfa1934fbee805df61244fc6556acbe569afbcc852937b26ed7220de303e88c454e68e4b83242dccfe7ff30a9101c9

Malware Config

Targets

    • Target

      4a72325c4b02a7766c3704a21a6852ec020a2cdcea921cebbe09ce4ed1ee8021

    • Size

      2.9MB

    • MD5

      7ff0209df97c2298170ced643485f3c8

    • SHA1

      f78379a5aa3641e38079649f78b29b7aefe1adc3

    • SHA256

      4a72325c4b02a7766c3704a21a6852ec020a2cdcea921cebbe09ce4ed1ee8021

    • SHA512

      9ab6bfbd3c6533b3c11e35955a71913ec7bfa1934fbee805df61244fc6556acbe569afbcc852937b26ed7220de303e88c454e68e4b83242dccfe7ff30a9101c9

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks