General

  • Target

    1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb

  • Size

    465KB

  • Sample

    220603-celj8aabbk

  • MD5

    ca6fe59945cf7d7ab411ec47fad20c80

  • SHA1

    92aa2e90a9368496193b052be0cd3c6e266e0663

  • SHA256

    1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb

  • SHA512

    7ca4130dc0a53cfd6e3ef7670befc9d00dab64e3e1f9a20d5bd5b8178ea41f71601972711175db1169401d71611157b652bd011fed283ecad54fd98e3f53ebca

Malware Config

Targets

    • Target

      1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb

    • Size

      465KB

    • MD5

      ca6fe59945cf7d7ab411ec47fad20c80

    • SHA1

      92aa2e90a9368496193b052be0cd3c6e266e0663

    • SHA256

      1423e8c23f4a7061d28daf43b69fd2b2bfdd49f694b79dd2438c40dbbc4370cb

    • SHA512

      7ca4130dc0a53cfd6e3ef7670befc9d00dab64e3e1f9a20d5bd5b8178ea41f71601972711175db1169401d71611157b652bd011fed283ecad54fd98e3f53ebca

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks