General

  • Target

    983ce8853725106df599e320199939140161fce15d2ab501b7cdd01a2a0962b9

  • Size

    492KB

  • Sample

    220203-s8tqpabcb3

  • MD5

    7473a04b715b6d22675d717a3abf8fb9

  • SHA1

    117b1823fcb312cf061f9d106112f07acd7ed63a

  • SHA256

    983ce8853725106df599e320199939140161fce15d2ab501b7cdd01a2a0962b9

  • SHA512

    96363224f030b07559793e94e31c5a327159cb175c62cf8a05610a1b6134f30d33ace8c22cf351557b282c927f7c224146c52f8ee4ef1f2bbb4f3c51ffdffc28

Malware Config

Targets

    • Target

      983ce8853725106df599e320199939140161fce15d2ab501b7cdd01a2a0962b9

    • Size

      492KB

    • MD5

      7473a04b715b6d22675d717a3abf8fb9

    • SHA1

      117b1823fcb312cf061f9d106112f07acd7ed63a

    • SHA256

      983ce8853725106df599e320199939140161fce15d2ab501b7cdd01a2a0962b9

    • SHA512

      96363224f030b07559793e94e31c5a327159cb175c62cf8a05610a1b6134f30d33ace8c22cf351557b282c927f7c224146c52f8ee4ef1f2bbb4f3c51ffdffc28

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks