Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Neshta( File Infector ) – Malware

June 1, 2023
Reading Time: 3 mins read
in Malware, Types of Malware
Name Neshta
Additional Names Win32:Crypt-SKC [Trj] (Avast), Win32.Neshta.A (BitDefender), Virus.Win32.Neshta.a (Kaspersky)
Type of Malware File Infector
Location – Country of Origin Europe
Date of initial activity 2010
Associated Groups BlackEnergy, Sandworm, Sofacy
Motivation Neshta uses infected files to collect various system information relating to the operating system, hardware, and installed software. Collected data is then sent to a remote server and criminals can easily use it to generate revenue in malicious ways, thereby causing a variety of privacy issues.
Attack Vectors Email, Downloads, USB drives, Network shares, Malvertising
Targeted System Windows

Overview

Netshta is a file infector and information stealer that targets executable files, network shares, and removable storage devices. Once the system is infected, it collects system information and exfiltarates data via its C2. Neshta spreads by phishing emails, removeable media, and other malware.

Targets

Mainly used to attack companies that specialize in finance, consumer goods, and energy. It is also used to attack the manufacturing industry.

Tools/ Techniques Used

Cyber criminals distribute this malware through other malware or infected files that people download from dubious download sources. Examples of malicious programs designed to spread other software of this type include Tortoiseshell, Torpig, and Nymeria. Typically, people are unaware that their computers are infected with these programs.

Impact / Significant Attacks

In 2007, Neshta malware was used to launch a cyberattack against Estonia. The attack targeted Estonian government websites, banks, and media organizations. The attack caused widespread disruption and damage, and it is believed to have been carried out by Russia.

In 2015, Neshta malware was used to launch a cyberattack against Ukraine. The attack targeted Ukrainian government websites, banks, and media organizations. The attack caused widespread disruption and damage, and it is believed to have been carried out by Russia.

In 2017, Neshta malware was used to spread the WannaCry ransomware. WannaCry is a type of malware that encrypts a victim’s files and demands a ransom payment in order to decrypt them. The WannaCry attack infected over 200,000 computers in over 150 countries.

Indicators of Compromise (IoCs)

SHA256 Hashes

29fd307edb4cfa4400a586d38116a90ce91233a3fc277de1cab7890e681c409a
980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
539452719c057f59238e123c80a0a10a0b577c4d8af7a5447903955e6cf7aa3d
a4d0865565180988c3d9dbf5ce35b7c17bac6458ef234cfed82b4664116851f2
46200c11811058e6d1173a2279213d0b7ccde611590e427b3b28c0f684192d00
c965f9503353ecd6971466d32c1ad2083a5475ce64aadc0b99ac13e2d2c31b75

References

  1. What kind of malware is Neshta?
  2. Virus.Neshta
  3. Top 10 Malware Q1 2023
Tags: AttackersCyberattackCybersecurityEmail SecurityFile InfectorMalvertisingMalwaremalware nameNeshtaUSB drivesWindows
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Sabotage Theft Malware On npm And PyPI

Salesforce SOQL Flaw Exposed User Records

HelloTDS Spreads Malware Via Fake CAPTCHAs

AMOS Stealer Hits macOS Via Fake CAPTCHA

Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

Subscribe to our newsletter

    Latest Incidents

    Hack Shuts Down Brazil City Health Systems

    Sorbonne University Hit By Staff Data Breach

    Chaos Gang Leaks Optima Tax Client Data

    German Dog Rescue IG Hacked For Ransom

    Hack Attempt Hits German Police Phone System

    InfoJobs Spain Hit By Credential Stuffing

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial