General

  • Target

    ap-file-vaultFile15128360499749433099.vol-1136508038.zip

  • Size

    96KB

  • Sample

    250112-2p1vbswjaj

  • MD5

    9987a2a72b44c7fa3e44ec070e057d33

  • SHA1

    71db38d92d94e52d7bdff29b2f1e76308194823c

  • SHA256

    47ec4b1df6909874972a34aca4ee4482342ae119a0e85f2afd49f0c072bd52d4

  • SHA512

    0a4965ab851248fccc897df0f1f7c55349645fa8d842c615ca545f84fcd75c796da512555d449542cec82eb1b3601bb0a2bbccf8a5b268ea0f7e6afeaf115f3f

  • SSDEEP

    3072:g7qCHDLVD/PBOWq2rbZGTWyftRZDTO5QOjBQt:94DX0Wq2/5Wt6/NY

Malware Config

Targets

    • Target

      vaultFile15128360499749433099.vol

    • Size

      277KB

    • MD5

      d68d344ecad020b93e4c4717039c562c

    • SHA1

      6e262260324736ba81fe664f425d0a65566a98ec

    • SHA256

      2c64e212d3589bc8da9e9f5e7737761c447456b74c47a297642caf507206d046

    • SHA512

      7823c76c43633cc3746c596b7a1fcf41dbd620e4c9affdbcf82cd370e93d3aa93b23b1a10128e0b1faf4d6cc0f46ab2284e5bdb6f1f62606ef362a7a2089a1d6

    • SSDEEP

      6144:k9va4hrp7qgMLMhxQxq0WqzhGOYmdloO/hXk6Q/EX1:n4jqLxqBqVGOYmvXF

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks