General

  • Target

    1775401d56db262a0ab8c13d920debdab4a6def8f7fc63c207bf9072839b9544

  • Size

    3.2MB

  • Sample

    220525-alqreagfdj

  • MD5

    86695c78bdc078304c59cf2d8f0b4f7f

  • SHA1

    5a75bb05c88bb8e41121b62ba3b57bf53affa756

  • SHA256

    1775401d56db262a0ab8c13d920debdab4a6def8f7fc63c207bf9072839b9544

  • SHA512

    c041c57495eaee0cf51cd3933e15d1568b65d1418154332ff349878db88dc44d5bd486abc0ae45202b31cd8588d20ed22791207db5ca5fc8b1580d0a8b002be0

Malware Config

Targets

    • Target

      1775401d56db262a0ab8c13d920debdab4a6def8f7fc63c207bf9072839b9544

    • Size

      3.2MB

    • MD5

      86695c78bdc078304c59cf2d8f0b4f7f

    • SHA1

      5a75bb05c88bb8e41121b62ba3b57bf53affa756

    • SHA256

      1775401d56db262a0ab8c13d920debdab4a6def8f7fc63c207bf9072839b9544

    • SHA512

      c041c57495eaee0cf51cd3933e15d1568b65d1418154332ff349878db88dc44d5bd486abc0ae45202b31cd8588d20ed22791207db5ca5fc8b1580d0a8b002be0

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks