General

  • Target

    3b923867f9312e99259ff057ae64dfa450a378bae39d0809b8dd864512bcd820

  • Size

    3.0MB

  • Sample

    220524-ct65gaffcr

  • MD5

    9613aec7bcaf60d4ac98acbf4a1627a4

  • SHA1

    125a4cd3d0ca1e319815517412382f978ae76467

  • SHA256

    3b923867f9312e99259ff057ae64dfa450a378bae39d0809b8dd864512bcd820

  • SHA512

    0831c34fba8015d3ca566a00528139de05b2b95d3e5ec69e1b454dba3bf12118a968869d7f4e553dc147a103dd7f42b7f6c4b1822a2c55d63a34978b918e0043

Malware Config

Targets

    • Target

      3b923867f9312e99259ff057ae64dfa450a378bae39d0809b8dd864512bcd820

    • Size

      3.0MB

    • MD5

      9613aec7bcaf60d4ac98acbf4a1627a4

    • SHA1

      125a4cd3d0ca1e319815517412382f978ae76467

    • SHA256

      3b923867f9312e99259ff057ae64dfa450a378bae39d0809b8dd864512bcd820

    • SHA512

      0831c34fba8015d3ca566a00528139de05b2b95d3e5ec69e1b454dba3bf12118a968869d7f4e553dc147a103dd7f42b7f6c4b1822a2c55d63a34978b918e0043

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks