General

  • Target

    d97d82d15bca1f31193596a1f32ae16563b50d14e7f73b18c909c9086bd37760

  • Size

    1.6MB

  • Sample

    220206-j8a4xaggc4

  • MD5

    a7a8f0c74a61b2de071ed987a2903396

  • SHA1

    1c8e5219542de15213a2c11f3333a09dce3ef4c8

  • SHA256

    d97d82d15bca1f31193596a1f32ae16563b50d14e7f73b18c909c9086bd37760

  • SHA512

    f77188ff058e2e7513236eb081ea079c76aaf2df882829d362a1b40c6e5a6999cc75707587b81aba67906b5a38e194f8896b10c3d168c9d2230fe37f6e29279e

Malware Config

Targets

    • Target

      d97d82d15bca1f31193596a1f32ae16563b50d14e7f73b18c909c9086bd37760

    • Size

      1.6MB

    • MD5

      a7a8f0c74a61b2de071ed987a2903396

    • SHA1

      1c8e5219542de15213a2c11f3333a09dce3ef4c8

    • SHA256

      d97d82d15bca1f31193596a1f32ae16563b50d14e7f73b18c909c9086bd37760

    • SHA512

      f77188ff058e2e7513236eb081ea079c76aaf2df882829d362a1b40c6e5a6999cc75707587b81aba67906b5a38e194f8896b10c3d168c9d2230fe37f6e29279e

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks