General

  • Target

    ap-file-vaultFile10369271631236430190.vol-1606077950.zip

  • Size

    48KB

  • Sample

    250112-2qd2yssrgx

  • MD5

    5140f8510eb76adfd7b97ed0ebc6ec8b

  • SHA1

    19e1ce52c3f5b5df6e9453cf577f4c8b2d369947

  • SHA256

    34cb458204a9a1cf4073955ebb40db158ac91e9b3028dbc269a58fa07202641f

  • SHA512

    077ee801e533200d5a0d018dd56adbf9af931fa46d289d230d35f64f6a66fb7654ca8dc3cc249eafbd9a1837042968d1a6695aaecb71c5641c9d3e0ed65319d8

  • SSDEEP

    1536:4m9EulAvBTaWoqb5vJo360y+d/plBbLXOT:4JRZOio360y+BNOT

Malware Config

Targets

    • Target

      vaultFile10369271631236430190.vol

    • Size

      121KB

    • MD5

      b0d5e51892a64b20e19452b7a840fd79

    • SHA1

      650911fb3aa065b0562a4fd7895452a319be378c

    • SHA256

      45c084de90496da0eb15aeffaa57f6a30ff54cbe89a500394847c1cbbb40fa18

    • SHA512

      df8ad5188dc16c3b74bce3ec5bcb914c992987597d470fc95fd10be1f7fcb640f1afd8cf8a2b119d1a4a92cc3eefa4582d0ec9d5d38e21c183e3f16b39d6dbab

    • SSDEEP

      1536:JxqjQ+P04wsmJCFuTekOS8B0/43hO9Z3DIZFZuiVx:sr85CI8B+RTDIZlx

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks