General

  • Target

    dfc0118208d73eb6288c6e0f7fd07d7b40fc7db960904b5d3cd600152c354339

  • Size

    207KB

  • Sample

    220524-cw3vtscdd8

  • MD5

    2a60d2a4441d4709018d079578bfc177

  • SHA1

    b6e79bb2f37b3cf56aa66d597c173c82b68d4da2

  • SHA256

    dfc0118208d73eb6288c6e0f7fd07d7b40fc7db960904b5d3cd600152c354339

  • SHA512

    42ad380f4ca4615c545b20a314ce86812fe9512a75970f5fb61ae7f076eb27664fdd8f0258705c7cec44389d56368456c61563d7ad03ce21b21285d121e30837

Malware Config

Targets

    • Target

      dfc0118208d73eb6288c6e0f7fd07d7b40fc7db960904b5d3cd600152c354339

    • Size

      207KB

    • MD5

      2a60d2a4441d4709018d079578bfc177

    • SHA1

      b6e79bb2f37b3cf56aa66d597c173c82b68d4da2

    • SHA256

      dfc0118208d73eb6288c6e0f7fd07d7b40fc7db960904b5d3cd600152c354339

    • SHA512

      42ad380f4ca4615c545b20a314ce86812fe9512a75970f5fb61ae7f076eb27664fdd8f0258705c7cec44389d56368456c61563d7ad03ce21b21285d121e30837

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks