General

  • Target

    2f6ab8e020a5d8bec45b8b0968c38a145c78d4165a115f41f6c295c2bd5845a8

  • Size

    655KB

  • Sample

    220524-1lel9ahag2

  • MD5

    244a277501a7acf0752714c66526f8ca

  • SHA1

    5f5fd8b9b203807b849ea8c98be8b5e95dc82d07

  • SHA256

    2f6ab8e020a5d8bec45b8b0968c38a145c78d4165a115f41f6c295c2bd5845a8

  • SHA512

    872156f1d4a7c8e779c7f2eae05b26da2eb91d87940f70d3f9996c781b52d45eab6df49553cbea20a05503a2d2c95935d74935dc6267dbb6b0abf4fb5f91e9b6

Malware Config

Targets

    • Target

      PO#7A68D20.exe

    • Size

      769KB

    • MD5

      5c777e4901a8f4175342bca7978ee3d5

    • SHA1

      ebc2a18781d087ed9fd7e43467f0da354c17d8c3

    • SHA256

      b54934cb8e1ff68d2c4306e5a6eb0f9e649ad1680960253c0cfa0c35a6c4d313

    • SHA512

      1113200c02673171d0e1ff8b9d049deea3a23c9e64f9ad211b0f99a5d8876f590a89e0fb6a57a32d90d686c2aa76df3bc496ac09e2ad8dec8750d11593947720

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks