General

  • Target

    1be02442a73833d35becd77c39e72440c3a600dba746912931f506311c745593

  • Size

    264KB

  • Sample

    220607-vvvryadge7

  • MD5

    e218ac1dac5d3f3a9de8aa098fe5f3cb

  • SHA1

    db4ea2a514ddb57a61d7e91836960cb072068803

  • SHA256

    1be02442a73833d35becd77c39e72440c3a600dba746912931f506311c745593

  • SHA512

    3640a1bd9f97eae176d7e745f621f62a5d7075a8b2ffb657a6720ceab3866cbf5b1c59de23cf0ed332d6ae99c9efa9eec12a4cf45fa8047611304cd64bd66a84

Malware Config

Targets

    • Target

      1be02442a73833d35becd77c39e72440c3a600dba746912931f506311c745593

    • Size

      264KB

    • MD5

      e218ac1dac5d3f3a9de8aa098fe5f3cb

    • SHA1

      db4ea2a514ddb57a61d7e91836960cb072068803

    • SHA256

      1be02442a73833d35becd77c39e72440c3a600dba746912931f506311c745593

    • SHA512

      3640a1bd9f97eae176d7e745f621f62a5d7075a8b2ffb657a6720ceab3866cbf5b1c59de23cf0ed332d6ae99c9efa9eec12a4cf45fa8047611304cd64bd66a84

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks