General

  • Target

    52865401637ababe754cc70a57b58b1183fb6036d9a63b14bdde08d3ee666480

  • Size

    602KB

  • Sample

    220701-gkeq3seffl

  • MD5

    993b822d6ddede8b886635e88f83cf59

  • SHA1

    01ec71e477dc29260e46ce2ee716a81a84eb176d

  • SHA256

    52865401637ababe754cc70a57b58b1183fb6036d9a63b14bdde08d3ee666480

  • SHA512

    37ebdb7192380410f69aaaec4f6f0ce681182fe7a0fb6183b8cd98aa842530e580751086ec421f985cc7ee58bba618bb4329fa957601150e910039ecf03634c9

Malware Config

Targets

    • Target

      52865401637ababe754cc70a57b58b1183fb6036d9a63b14bdde08d3ee666480

    • Size

      602KB

    • MD5

      993b822d6ddede8b886635e88f83cf59

    • SHA1

      01ec71e477dc29260e46ce2ee716a81a84eb176d

    • SHA256

      52865401637ababe754cc70a57b58b1183fb6036d9a63b14bdde08d3ee666480

    • SHA512

      37ebdb7192380410f69aaaec4f6f0ce681182fe7a0fb6183b8cd98aa842530e580751086ec421f985cc7ee58bba618bb4329fa957601150e910039ecf03634c9

    • Detect Neshta Payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks