General

  • Target

    26b6a82a8aa0b4f58f3935bc1e67d086b67a1f077c7c10ecbf9378050510e5a5

  • Size

    1.0MB

  • Sample

    220616-jen4nsbgb4

  • MD5

    e8b4cd3bc07f724c6664b3ae6a4ae2f7

  • SHA1

    a413fcae44b0496c74f8e0cd34fb8e9546062b19

  • SHA256

    26b6a82a8aa0b4f58f3935bc1e67d086b67a1f077c7c10ecbf9378050510e5a5

  • SHA512

    e2c4623d4272415033a4748a2a914bd26ef5089551bde644ba51793a7490a602f39bd5da482c0f26e147705bd73111003d753e01bacc107dbea028fa7382124f

Malware Config

Targets

    • Target

      26b6a82a8aa0b4f58f3935bc1e67d086b67a1f077c7c10ecbf9378050510e5a5

    • Size

      1.0MB

    • MD5

      e8b4cd3bc07f724c6664b3ae6a4ae2f7

    • SHA1

      a413fcae44b0496c74f8e0cd34fb8e9546062b19

    • SHA256

      26b6a82a8aa0b4f58f3935bc1e67d086b67a1f077c7c10ecbf9378050510e5a5

    • SHA512

      e2c4623d4272415033a4748a2a914bd26ef5089551bde644ba51793a7490a602f39bd5da482c0f26e147705bd73111003d753e01bacc107dbea028fa7382124f

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks