General

  • Target

    2025-02-07_0fa8d67b7b0dcdb853e4d623fc961d4c_neshta_snake

  • Size

    3.8MB

  • Sample

    250207-vxq7jazlh1

  • MD5

    0fa8d67b7b0dcdb853e4d623fc961d4c

  • SHA1

    5fe09bcc7c94fe22b3df959c89d80b61c69431c8

  • SHA256

    069e5741562c5058aa9ccc58b47050fada4b5738ab08f42eada6d1caf75f20b0

  • SHA512

    3a80d1d8af2cf12162f4102d500083b5597b72a2fe49699987e320a085560349854bbe087f3b3fdec4b61daec0a477386ec4644556cc4c09802ac3b9877b4ae8

  • SSDEEP

    24576:icVmmyK+Y8J0r1dpvZlGhiUTPQOMoezwFnKS1yb0zrs7HjeAzgeJENrud9qcjL1r:icV8Ytr1dhrwierOjeAzAruTqQt02+k

Malware Config

Targets

    • Target

      2025-02-07_0fa8d67b7b0dcdb853e4d623fc961d4c_neshta_snake

    • Size

      3.8MB

    • MD5

      0fa8d67b7b0dcdb853e4d623fc961d4c

    • SHA1

      5fe09bcc7c94fe22b3df959c89d80b61c69431c8

    • SHA256

      069e5741562c5058aa9ccc58b47050fada4b5738ab08f42eada6d1caf75f20b0

    • SHA512

      3a80d1d8af2cf12162f4102d500083b5597b72a2fe49699987e320a085560349854bbe087f3b3fdec4b61daec0a477386ec4644556cc4c09802ac3b9877b4ae8

    • SSDEEP

      24576:icVmmyK+Y8J0r1dpvZlGhiUTPQOMoezwFnKS1yb0zrs7HjeAzgeJENrud9qcjL1r:icV8Ytr1dhrwierOjeAzAruTqQt02+k

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Zebrocy

      Zebrocy is a backdoor created by Sofacy threat group and has multiple variants developed in different languages.

    • Zebrocy Go Variant

    • Zebrocy family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks