General

  • Target

    b9cf68589937f874c1b247cacec8f6e5ea21ed9f7a91f262a19c9fd1323f99b1

  • Size

    802KB

  • Sample

    220524-d46r5ahfdm

  • MD5

    0a0f18968171592d780c37040b0cc8f7

  • SHA1

    b3ac11608c14718a2dda2e473404ad3be148381c

  • SHA256

    b9cf68589937f874c1b247cacec8f6e5ea21ed9f7a91f262a19c9fd1323f99b1

  • SHA512

    d26b9c704da351a78009636792653a57d3fa763a6fdb99c61d04ff66b9ce340cb39ee1dc795270dccf786e3a9a6df725eea4437bb673f622faa192f87f34bc06

Malware Config

Targets

    • Target

      b9cf68589937f874c1b247cacec8f6e5ea21ed9f7a91f262a19c9fd1323f99b1

    • Size

      802KB

    • MD5

      0a0f18968171592d780c37040b0cc8f7

    • SHA1

      b3ac11608c14718a2dda2e473404ad3be148381c

    • SHA256

      b9cf68589937f874c1b247cacec8f6e5ea21ed9f7a91f262a19c9fd1323f99b1

    • SHA512

      d26b9c704da351a78009636792653a57d3fa763a6fdb99c61d04ff66b9ce340cb39ee1dc795270dccf786e3a9a6df725eea4437bb673f622faa192f87f34bc06

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks