General

  • Target

    55ad64d7184946ab9a67bec0ffbe6a05c0d09135974f232fb96852612837c193

  • Size

    1.4MB

  • Sample

    220524-31t2laccg9

  • MD5

    dfb31e252db20525868ffe350e2392fb

  • SHA1

    720c0869339112f0cfb823445273f605556d08f4

  • SHA256

    55ad64d7184946ab9a67bec0ffbe6a05c0d09135974f232fb96852612837c193

  • SHA512

    5b153dca41115bf150541229a50b7a770125b4b7f996f1b40ae51f5b7cf32795edbcc162a94b8087e4d818435c28f631a1ba2b0225b290f606aec6b080c7438e

Malware Config

Targets

    • Target

      55ad64d7184946ab9a67bec0ffbe6a05c0d09135974f232fb96852612837c193

    • Size

      1.4MB

    • MD5

      dfb31e252db20525868ffe350e2392fb

    • SHA1

      720c0869339112f0cfb823445273f605556d08f4

    • SHA256

      55ad64d7184946ab9a67bec0ffbe6a05c0d09135974f232fb96852612837c193

    • SHA512

      5b153dca41115bf150541229a50b7a770125b4b7f996f1b40ae51f5b7cf32795edbcc162a94b8087e4d818435c28f631a1ba2b0225b290f606aec6b080c7438e

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks