General

  • Target

    7f6e29a854d4f1f3f6f19dcb1126273c37f4224dfe3bf06a24631fbee7a2cf8c

  • Size

    829KB

  • Sample

    221202-r2rr3sga74

  • MD5

    027e5d553aad71df1b213e1f3736d540

  • SHA1

    9e5816cfae9ae0685dae5ceee87f90ee28c7c826

  • SHA256

    7f6e29a854d4f1f3f6f19dcb1126273c37f4224dfe3bf06a24631fbee7a2cf8c

  • SHA512

    a4137d1eef4a7c51e6e80afaea76d4d7fa4c0636d7fa1e41ed9a7cdace8e8df0012ea5585500fd0a699c803f4b8ccc41ef8fd8c6cf101b0ac66e001100a681a7

  • SSDEEP

    12288:BUo8xhMoYe3aGeoaGeoaGeoaGeoaGeoaGeoaGeoa:KoEh1YYaGjaGjaGjaGjaGjaGjaGja

Malware Config

Targets

    • Target

      7f6e29a854d4f1f3f6f19dcb1126273c37f4224dfe3bf06a24631fbee7a2cf8c

    • Size

      829KB

    • MD5

      027e5d553aad71df1b213e1f3736d540

    • SHA1

      9e5816cfae9ae0685dae5ceee87f90ee28c7c826

    • SHA256

      7f6e29a854d4f1f3f6f19dcb1126273c37f4224dfe3bf06a24631fbee7a2cf8c

    • SHA512

      a4137d1eef4a7c51e6e80afaea76d4d7fa4c0636d7fa1e41ed9a7cdace8e8df0012ea5585500fd0a699c803f4b8ccc41ef8fd8c6cf101b0ac66e001100a681a7

    • SSDEEP

      12288:BUo8xhMoYe3aGeoaGeoaGeoaGeoaGeoaGeoaGeoa:KoEh1YYaGjaGjaGjaGjaGjaGjaGja

    • Detect Neshta payload

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks