General

  • Target

    5d0eaecf3ec216327ef1a7161d2d10d8d46365705f8de41aafdab4516ea8ae63

  • Size

    2.7MB

  • Sample

    220801-e5cq4sahhl

  • MD5

    b7eb659ac366827122e2d6244966eb2d

  • SHA1

    4365d5cae42f6ad870aeee57356e105b6cfc8bc6

  • SHA256

    5d0eaecf3ec216327ef1a7161d2d10d8d46365705f8de41aafdab4516ea8ae63

  • SHA512

    1fbc2b0086b04a1d31499a5984fadd4e2ea6a4f8a7b017b9b1139ba0e323f1eb9d48d70249341094246adb0693066a399e3b617fd82573cfaff3a3699dee81b6

Malware Config

Targets

    • Target

      5d0eaecf3ec216327ef1a7161d2d10d8d46365705f8de41aafdab4516ea8ae63

    • Size

      2.7MB

    • MD5

      b7eb659ac366827122e2d6244966eb2d

    • SHA1

      4365d5cae42f6ad870aeee57356e105b6cfc8bc6

    • SHA256

      5d0eaecf3ec216327ef1a7161d2d10d8d46365705f8de41aafdab4516ea8ae63

    • SHA512

      1fbc2b0086b04a1d31499a5984fadd4e2ea6a4f8a7b017b9b1139ba0e323f1eb9d48d70249341094246adb0693066a399e3b617fd82573cfaff3a3699dee81b6

    • Detect Neshta payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks