General

  • Target

    0bc789f6cd780c0c68ad087421b81e7514a4cc4313abf6fe0b6a1302a0b9eb32

  • Size

    145KB

  • Sample

    220222-zf13maegaq

  • MD5

    e099695cd53b3e77c9730656e1893f84

  • SHA1

    174584e6c6d17719e8db23cb0036ae70deca9ec4

  • SHA256

    0bc789f6cd780c0c68ad087421b81e7514a4cc4313abf6fe0b6a1302a0b9eb32

  • SHA512

    6201983ec250fd17089de92312b9e90d3d47499f1ae6c1b4a6f8545ecdc15bc4992c6e40fb87336b303536abcff6d832884d942c2e776d9de69265aafa6d1725

Malware Config

Targets

    • Target

      0bc789f6cd780c0c68ad087421b81e7514a4cc4313abf6fe0b6a1302a0b9eb32

    • Size

      145KB

    • MD5

      e099695cd53b3e77c9730656e1893f84

    • SHA1

      174584e6c6d17719e8db23cb0036ae70deca9ec4

    • SHA256

      0bc789f6cd780c0c68ad087421b81e7514a4cc4313abf6fe0b6a1302a0b9eb32

    • SHA512

      6201983ec250fd17089de92312b9e90d3d47499f1ae6c1b4a6f8545ecdc15bc4992c6e40fb87336b303536abcff6d832884d942c2e776d9de69265aafa6d1725

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks