General

  • Target

    838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3

  • Size

    451KB

  • Sample

    220203-tfy1dabdc8

  • MD5

    6de1e49036e9654914c333f39b17aa15

  • SHA1

    f9647c886e99852ba0ee47fa6ea9b1ac42ce9239

  • SHA256

    838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3

  • SHA512

    9791079dac388ed6225c4b6352dfe2090692359208f74a2950528bd1aba80aa3b6a88b7c882cfc787b8d29d77ca69d44d798075a4674152f350948312abfc054

Malware Config

Targets

    • Target

      838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3

    • Size

      451KB

    • MD5

      6de1e49036e9654914c333f39b17aa15

    • SHA1

      f9647c886e99852ba0ee47fa6ea9b1ac42ce9239

    • SHA256

      838051a06809ce7f19d9de22352a05bab997d238ec6d264afed92407069655d3

    • SHA512

      9791079dac388ed6225c4b6352dfe2090692359208f74a2950528bd1aba80aa3b6a88b7c882cfc787b8d29d77ca69d44d798075a4674152f350948312abfc054

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks