General

  • Target

    e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe

  • Size

    429KB

  • Sample

    221110-bf3z8adef9

  • MD5

    b88b8e449bb192a4e02dd49eb86d63d7

  • SHA1

    143da397c9b972247147da79b11ae72b4dae07e8

  • SHA256

    e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5

  • SHA512

    ce4b54ab4266118e49153ac500cc0da92e5ca8fe32f25c7e91dbdd90da87f0ada32a020a42bc36ac98f64b6be3123d86e70c1c36fd888ed58c4f8fd184b4cbb1

  • SSDEEP

    6144:k9rI7T8AzZV2MYORbAV9bQdnXgfyVQhAyPlb/F+bsn9:LIkEMtiQdwfyVQhAyPlb/wb

Malware Config

Targets

    • Target

      e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5.bin.exe

    • Size

      429KB

    • MD5

      b88b8e449bb192a4e02dd49eb86d63d7

    • SHA1

      143da397c9b972247147da79b11ae72b4dae07e8

    • SHA256

      e5feb5ef614c161566bda4c742e979ece3c40ebe5ee6610e47b3a4798b3d50c5

    • SHA512

      ce4b54ab4266118e49153ac500cc0da92e5ca8fe32f25c7e91dbdd90da87f0ada32a020a42bc36ac98f64b6be3123d86e70c1c36fd888ed58c4f8fd184b4cbb1

    • SSDEEP

      6144:k9rI7T8AzZV2MYORbAV9bQdnXgfyVQhAyPlb/F+bsn9:LIkEMtiQdwfyVQhAyPlb/wb

    • Detect Neshta payload

    • Detects IceXLoader v3.0

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • icexloader

      IceXLoader is a downloader used to deliver other malware families.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks