General

  • Target

    36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe

  • Size

    541KB

  • Sample

    241219-a823yszqhk

  • MD5

    6b906d57676cc916d404cc88fef0c590

  • SHA1

    e368ca486debf6f912924dfc11df3b64983e1b2b

  • SHA256

    36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6

  • SHA512

    4655ff302552ae86f9fb0c9c7db9f454a522fcf8c004224db7ea58da5e9ff58770c934a5399645887a78a2d068baa6c516b172c37190c5304a7beebe918fbad2

  • SSDEEP

    6144:k9BmAQIPvTmaEVmP02yCUE+cw0wIceA4D55qv4t/uBmohChYgXP6RIeLWKiBlwq:9AQIXqaE0yCgqwXeAVmoEAlLViBlwq

Malware Config

Targets

    • Target

      36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe

    • Size

      541KB

    • MD5

      6b906d57676cc916d404cc88fef0c590

    • SHA1

      e368ca486debf6f912924dfc11df3b64983e1b2b

    • SHA256

      36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6

    • SHA512

      4655ff302552ae86f9fb0c9c7db9f454a522fcf8c004224db7ea58da5e9ff58770c934a5399645887a78a2d068baa6c516b172c37190c5304a7beebe918fbad2

    • SSDEEP

      6144:k9BmAQIPvTmaEVmP02yCUE+cw0wIceA4D55qv4t/uBmohChYgXP6RIeLWKiBlwq:9AQIXqaE0yCgqwXeAVmoEAlLViBlwq

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks