General

  • Target

    640c7be1a761f5ac49f17f81fc7a1a8ee8a22bdba59ee23597ce4259e9cdb337

  • Size

    416KB

  • Sample

    221202-r2xy4abf9s

  • MD5

    6f8b7cfea6d31b43eb0693fe22439dd9

  • SHA1

    beb9f2ed72864411a7d51574abb15db301cee9ff

  • SHA256

    640c7be1a761f5ac49f17f81fc7a1a8ee8a22bdba59ee23597ce4259e9cdb337

  • SHA512

    75992a4414134cb4b7a58959c0dd3b31589de91fa8a671860aa3dc283e9e66f74e4407771b45bdb8b7ad60a440d20b646c453745c85a9626f8960cbaddf0aa70

  • SSDEEP

    6144:c9ZiTc3NWfJRaEfcPjpinjk2J6gaPs247BrNO4A+r94/q6m:vTc01fcPon5J15H04DgqH

Malware Config

Targets

    • Target

      640c7be1a761f5ac49f17f81fc7a1a8ee8a22bdba59ee23597ce4259e9cdb337

    • Size

      416KB

    • MD5

      6f8b7cfea6d31b43eb0693fe22439dd9

    • SHA1

      beb9f2ed72864411a7d51574abb15db301cee9ff

    • SHA256

      640c7be1a761f5ac49f17f81fc7a1a8ee8a22bdba59ee23597ce4259e9cdb337

    • SHA512

      75992a4414134cb4b7a58959c0dd3b31589de91fa8a671860aa3dc283e9e66f74e4407771b45bdb8b7ad60a440d20b646c453745c85a9626f8960cbaddf0aa70

    • SSDEEP

      6144:c9ZiTc3NWfJRaEfcPjpinjk2J6gaPs247BrNO4A+r94/q6m:vTc01fcPon5J15H04DgqH

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks