General

  • Target

    file.exe

  • Size

    5.7MB

  • Sample

    241204-vx5pxssncy

  • MD5

    54c804c8f597748ce17394624b6c08a4

  • SHA1

    4afa779208e5fa47630a8c4a17107e54db2234f5

  • SHA256

    6163a3302b0eb60ff371116b0e90de30df65493ac7192235d4495e43c4a41d4f

  • SHA512

    17ef71946a361962fc1747d78b60bb481574fba96b079cc3f7b2f220fa36db506cecd3ef9729c84c4e20b9c04b50ec766431d5dce0e21b8f2a15037750003384

  • SSDEEP

    49152:trikhN5aCxzCm5BOjP7lTu142JueO4dG8Hc64HTan/Fb:RQXQ

Malware Config

Targets

    • Target

      file.exe

    • Size

      5.7MB

    • MD5

      54c804c8f597748ce17394624b6c08a4

    • SHA1

      4afa779208e5fa47630a8c4a17107e54db2234f5

    • SHA256

      6163a3302b0eb60ff371116b0e90de30df65493ac7192235d4495e43c4a41d4f

    • SHA512

      17ef71946a361962fc1747d78b60bb481574fba96b079cc3f7b2f220fa36db506cecd3ef9729c84c4e20b9c04b50ec766431d5dce0e21b8f2a15037750003384

    • SSDEEP

      49152:trikhN5aCxzCm5BOjP7lTu142JueO4dG8Hc64HTan/Fb:RQXQ

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks