General

  • Target

    ap-file-vaultFile17059910345723742940.vol--1083632278.zip

  • Size

    40KB

  • Sample

    250112-2wf4hatkew

  • MD5

    d81e0402a6185cd0bfe206531f4ea299

  • SHA1

    1a43805f41472a151e4a82814e2ea690555124a4

  • SHA256

    adc9f3eaf397c7b186beba10f148f51092f853f90a90242d653efbb9f7cae498

  • SHA512

    667b5e1da872fe5a189c58a79676add24760171b9df1b0d7850345a264005ed3f40b9c5a59e27dcd7bae0fc6fa834cb849406b90d45169db844b817e69ce1757

  • SSDEEP

    768:pLl8i1djNM00c78/04fK1RsLEBOOAPu1FVX:p5VTj6cQ/dyjsiO4

Malware Config

Targets

    • Target

      vaultFile17059910345723742940.vol

    • Size

      93KB

    • MD5

      05e08268aba77971c4dd84fb1b0ca597

    • SHA1

      f6bcabdee375200d853d856bc9ff72857f43f246

    • SHA256

      6ba23f3bead65b5bbdccf4a939c6d17ffd45cda860bbd40db97af5a508638cf4

    • SHA512

      df2e00a9567cd4bd4b8b04e16fe74d44cdd6fec82ccc7a091fa93d3e078d437fde34eea3b26808be29d658d9f9cc09179a454b672337d29b201ecc37afeaa1b5

    • SSDEEP

      1536:JxqjQ+P04wsmJCD3hxIrbu6pbTjpant1p0ZMCIIcqFrarvVQm4cnFk:sr85CD6bu6pbTjpant1p0ZMZIcKyvWRH

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks