General

  • Target

    67414c50442005a05cf1d3200ed6903d43bb10fe97b91f3ba5fb20b5111066ee

  • Size

    5.8MB

  • Sample

    221125-qa2brsaa43

  • MD5

    92d102b09864103c6cad122c76f1fea6

  • SHA1

    cd28994ab158fd357aeb71d0b33ed2312d4194ce

  • SHA256

    67414c50442005a05cf1d3200ed6903d43bb10fe97b91f3ba5fb20b5111066ee

  • SHA512

    4e117e464521c41d2020cb565f157b4b2b266e60dffcb5d73371b9770044c14b5df184a7752455e2836ac9dc7aad4e0f6d5ad31416238e205c3f8cddb5e4ed31

  • SSDEEP

    98304:5lXMjBFx2i0ro9+bkcC79cUpRgoC2BVZQUEnpaAV4f6PE4OmiuO3vh:5lXMjBFAi0ro0bkcEmxcv/+paAV4faLK

Malware Config

Targets

    • Target

      67414c50442005a05cf1d3200ed6903d43bb10fe97b91f3ba5fb20b5111066ee

    • Size

      5.8MB

    • MD5

      92d102b09864103c6cad122c76f1fea6

    • SHA1

      cd28994ab158fd357aeb71d0b33ed2312d4194ce

    • SHA256

      67414c50442005a05cf1d3200ed6903d43bb10fe97b91f3ba5fb20b5111066ee

    • SHA512

      4e117e464521c41d2020cb565f157b4b2b266e60dffcb5d73371b9770044c14b5df184a7752455e2836ac9dc7aad4e0f6d5ad31416238e205c3f8cddb5e4ed31

    • SSDEEP

      98304:5lXMjBFx2i0ro9+bkcC79cUpRgoC2BVZQUEnpaAV4f6PE4OmiuO3vh:5lXMjBFAi0ro0bkcEmxcv/+paAV4faLK

    • Detect Neshta payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Tasks