General

  • Target

    7bcb566fb0612a6b4293e73ac1c58b4286632d8927d86f170c11e53dc559bc07

  • Size

    1.2MB

  • Sample

    220211-d9mw7scaep

  • MD5

    88e18c40f5c22bbaa57eb744b2dd9cca

  • SHA1

    fe02cd10b0860330043afdb3e2a0f442bcc6ec33

  • SHA256

    7bcb566fb0612a6b4293e73ac1c58b4286632d8927d86f170c11e53dc559bc07

  • SHA512

    f3ddf5ee083ace66b6186fe8dd4be002c5073fd2eee3b405188381b92211f4626b10e5ca3dc98c42451cf2a0374c2f2a022c82674faafebf02c0d2382dfeacfe

Malware Config

Targets

    • Target

      7bcb566fb0612a6b4293e73ac1c58b4286632d8927d86f170c11e53dc559bc07

    • Size

      1.2MB

    • MD5

      88e18c40f5c22bbaa57eb744b2dd9cca

    • SHA1

      fe02cd10b0860330043afdb3e2a0f442bcc6ec33

    • SHA256

      7bcb566fb0612a6b4293e73ac1c58b4286632d8927d86f170c11e53dc559bc07

    • SHA512

      f3ddf5ee083ace66b6186fe8dd4be002c5073fd2eee3b405188381b92211f4626b10e5ca3dc98c42451cf2a0374c2f2a022c82674faafebf02c0d2382dfeacfe

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks