General
-
Target
2025-02-07_0fa8d67b7b0dcdb853e4d623fc961d4c_neshta_snake
-
Size
3.8MB
-
Sample
250207-vxq7jazlh1
-
MD5
0fa8d67b7b0dcdb853e4d623fc961d4c
-
SHA1
5fe09bcc7c94fe22b3df959c89d80b61c69431c8
-
SHA256
069e5741562c5058aa9ccc58b47050fada4b5738ab08f42eada6d1caf75f20b0
-
SHA512
3a80d1d8af2cf12162f4102d500083b5597b72a2fe49699987e320a085560349854bbe087f3b3fdec4b61daec0a477386ec4644556cc4c09802ac3b9877b4ae8
-
SSDEEP
24576:icVmmyK+Y8J0r1dpvZlGhiUTPQOMoezwFnKS1yb0zrs7HjeAzgeJENrud9qcjL1r:icV8Ytr1dhrwierOjeAzAruTqQt02+k
Behavioral task
behavioral1
Sample
2025-02-07_0fa8d67b7b0dcdb853e4d623fc961d4c_neshta_snake.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-07_0fa8d67b7b0dcdb853e4d623fc961d4c_neshta_snake.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
2025-02-07_0fa8d67b7b0dcdb853e4d623fc961d4c_neshta_snake
-
Size
3.8MB
-
MD5
0fa8d67b7b0dcdb853e4d623fc961d4c
-
SHA1
5fe09bcc7c94fe22b3df959c89d80b61c69431c8
-
SHA256
069e5741562c5058aa9ccc58b47050fada4b5738ab08f42eada6d1caf75f20b0
-
SHA512
3a80d1d8af2cf12162f4102d500083b5597b72a2fe49699987e320a085560349854bbe087f3b3fdec4b61daec0a477386ec4644556cc4c09802ac3b9877b4ae8
-
SSDEEP
24576:icVmmyK+Y8J0r1dpvZlGhiUTPQOMoezwFnKS1yb0zrs7HjeAzgeJENrud9qcjL1r:icV8Ytr1dhrwierOjeAzAruTqQt02+k
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Zebrocy Go Variant
-
Zebrocy family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Change Default File Association
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1