General

  • Target

    22cc2bf4bb1b9371c88ec45940ef2ca81cbed3a57fdf338c141bb0c565eb43d3

  • Size

    817KB

  • Sample

    220725-c888dabgar

  • MD5

    fa918fd596a56ff885617eb243748684

  • SHA1

    fd71d26a624f4c22da943ba3591851e9735cee07

  • SHA256

    22cc2bf4bb1b9371c88ec45940ef2ca81cbed3a57fdf338c141bb0c565eb43d3

  • SHA512

    fd6426a38143b91d394309a569c61b45cad0e6ea4738fad88936173978309f9d1fa3c0ceb7fe31005ddbfb3259510edb4ed1df22b3ef55f00210484d40c0a25a

Malware Config

Targets

    • Target

      22cc2bf4bb1b9371c88ec45940ef2ca81cbed3a57fdf338c141bb0c565eb43d3

    • Size

      817KB

    • MD5

      fa918fd596a56ff885617eb243748684

    • SHA1

      fd71d26a624f4c22da943ba3591851e9735cee07

    • SHA256

      22cc2bf4bb1b9371c88ec45940ef2ca81cbed3a57fdf338c141bb0c565eb43d3

    • SHA512

      fd6426a38143b91d394309a569c61b45cad0e6ea4738fad88936173978309f9d1fa3c0ceb7fe31005ddbfb3259510edb4ed1df22b3ef55f00210484d40c0a25a

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks