General

  • Target

    c0aeb3cdadf89cb03bba66d465a7094ffaa9823f4261277caa6ad05c12514801

  • Size

    798KB

  • Sample

    220211-ftzl6sbbe6

  • MD5

    03b6789a42bcf8cc448a934204b7b7ae

  • SHA1

    5dc84935d0a3a9da5005e7e6dbf19dd82a187419

  • SHA256

    c0aeb3cdadf89cb03bba66d465a7094ffaa9823f4261277caa6ad05c12514801

  • SHA512

    b1b15bc24ba68920a7b1abb5c14fca76845cb1275158ecd7dcc0b9a356a13cf75c7120028ce139da345935d14dbcdf05ad40eb753cf426038ded84fb0313073e

Malware Config

Targets

    • Target

      c0aeb3cdadf89cb03bba66d465a7094ffaa9823f4261277caa6ad05c12514801

    • Size

      798KB

    • MD5

      03b6789a42bcf8cc448a934204b7b7ae

    • SHA1

      5dc84935d0a3a9da5005e7e6dbf19dd82a187419

    • SHA256

      c0aeb3cdadf89cb03bba66d465a7094ffaa9823f4261277caa6ad05c12514801

    • SHA512

      b1b15bc24ba68920a7b1abb5c14fca76845cb1275158ecd7dcc0b9a356a13cf75c7120028ce139da345935d14dbcdf05ad40eb753cf426038ded84fb0313073e

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks