General

  • Target

    e9cf73adc8da7d74d6477c61664c22ba624365d56fefa99aede69d3e447d9d80

  • Size

    139KB

  • Sample

    220524-v94ndsfgbm

  • MD5

    d9659eb9fa16a4c873a4e74610008bb7

  • SHA1

    aab0ef0b04597ef4cbb133eae99972fedbc2622d

  • SHA256

    e9cf73adc8da7d74d6477c61664c22ba624365d56fefa99aede69d3e447d9d80

  • SHA512

    507d3edbe5dd5d707a836511f6097d55c7249b6a7c12072c0267c71790301c4947a1539c93619d3961481180d78bcf299ccfd363944fb208b167495551acffaa

Malware Config

Targets

    • Target

      e9cf73adc8da7d74d6477c61664c22ba624365d56fefa99aede69d3e447d9d80

    • Size

      139KB

    • MD5

      d9659eb9fa16a4c873a4e74610008bb7

    • SHA1

      aab0ef0b04597ef4cbb133eae99972fedbc2622d

    • SHA256

      e9cf73adc8da7d74d6477c61664c22ba624365d56fefa99aede69d3e447d9d80

    • SHA512

      507d3edbe5dd5d707a836511f6097d55c7249b6a7c12072c0267c71790301c4947a1539c93619d3961481180d78bcf299ccfd363944fb208b167495551acffaa

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks