General

  • Target

    33e68c60f247b5ef7e4feb1c572a5334e6f4ec1799874eaecae39f772da3a912

  • Size

    1.3MB

  • Sample

    220625-v7m8madgdm

  • MD5

    0a7418996a253efc897bd74a344a5f11

  • SHA1

    08158bc6ec42aa0da7577e5071ac45eaa531e511

  • SHA256

    33e68c60f247b5ef7e4feb1c572a5334e6f4ec1799874eaecae39f772da3a912

  • SHA512

    84014a051a992b0972b3ed6039ddc4fead2a1228ebd6ecea8c30119f3d76ab482f20223038632192957cc0d44ffa38f2c9c7d70e0f677fc53a506a5293734ff8

Malware Config

Targets

    • Target

      33e68c60f247b5ef7e4feb1c572a5334e6f4ec1799874eaecae39f772da3a912

    • Size

      1.3MB

    • MD5

      0a7418996a253efc897bd74a344a5f11

    • SHA1

      08158bc6ec42aa0da7577e5071ac45eaa531e511

    • SHA256

      33e68c60f247b5ef7e4feb1c572a5334e6f4ec1799874eaecae39f772da3a912

    • SHA512

      84014a051a992b0972b3ed6039ddc4fead2a1228ebd6ecea8c30119f3d76ab482f20223038632192957cc0d44ffa38f2c9c7d70e0f677fc53a506a5293734ff8

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks