General

  • Target

    ap-file-vaultFile17014791945718416581.vol-1917625634.zip

  • Size

    53KB

  • Sample

    250112-2k1zjavqbq

  • MD5

    1e6c969d9b49f6cdb8273cbced20cad5

  • SHA1

    c54ae1ffc5ee2ed5e1211dc9f52c20786c34ca04

  • SHA256

    a23e2caeb2453e3b385efb8691d8d7b813956d558b00a725617ba53698941e77

  • SHA512

    677f48ae411373a5326387bbbec1122ac9282cc0f217d1abc517cdf70aa6c35211821ac1236e59e468e994b08db5db6d0717a6ac580d70176b4347d0e65e722a

  • SSDEEP

    1536:GdBW27oTRRN2TaQwlEmCvKnn968NqWnJ1DK37mSmSJip:4iTPofwPCgk8Npn7DKrmp

Malware Config

Targets

    • Target

      vaultFile17014791945718416581.vol

    • Size

      129KB

    • MD5

      af5814f78ef77f83f9ead1caf5ada012

    • SHA1

      b9fe65dd240558a1d39b21a0d5f3b48345263eb4

    • SHA256

      354622421a1966755dd59eff4145c8a7f1b6ed9cba2ca87f186e85f4e272b89f

    • SHA512

      287afdb13169a5807d7248ca0db117c7364beb5e8daaa98abdcb81ff12c59a7c9e04dad52dfd695b2cac303894de958f1363200c505e0491a564eba3dcd16f65

    • SSDEEP

      1536:JxqjQ+P04wsmJCsPKxG7QeLuk/3hIFmNjEX/QSjv+T:sr85CsSxG7hukqCAX/QSjve

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks