General

  • Target

    c775ab6ed832adc57d0c40c5a42b782298c033877768bd0ade58ae92812b18d6

  • Size

    168KB

  • Sample

    240417-p3hjpafh53

  • MD5

    748ba1431d77e36fde9668594e3f7ec9

  • SHA1

    1bcf316311ca86be3ba11890fcfb96d25d419440

  • SHA256

    c775ab6ed832adc57d0c40c5a42b782298c033877768bd0ade58ae92812b18d6

  • SHA512

    74588e3dd24c77b75657a553b2a8dff48c0e1648198f611002fdda11fef9869a32c66574bf0966d87caa3b801e5f46a1ee758f66d7a9f8a7bf21b75a8b723de0

  • SSDEEP

    3072:e0KBxbn2NKt6CEDedpcmrI9Mla+LWGkKByKpCpeVpiBqEByb:hcrDIeSmmMlDL9UKBVQBqEAb

Malware Config

Targets

    • Target

      9f8cf9ba6dbd13f970e1413410dc2a7c7bebb76dd94434f0eb004401a268fa28.exe

    • Size

      514KB

    • MD5

      0e8e9957231a021ec5ff92da17e17177

    • SHA1

      e64893538fd7cdd60191576a0533eba967511258

    • SHA256

      9f8cf9ba6dbd13f970e1413410dc2a7c7bebb76dd94434f0eb004401a268fa28

    • SHA512

      fe6d4655e4ea5547f20fa7550593c5cb083d7a5f3a88dec1991ce89c27e9e5b4d8cb2ae277d0431d9d60c6edb2c624c94abc20337776b78a654047be7c725ab5

    • SSDEEP

      6144:k90PL27eaxwTh7qSqRKb8l3Wvo3jrEvTDp9WjcqwqwJWobF3rutOiUbRq:ZPa6qAPo3jrE7dtbktOm

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks