General
-
Target
6ecb9d22d6fa780cfd76b2d838bcb374360782d4b547e65f14e4fb1e08c59309
-
Size
1.8MB
-
Sample
220205-e966hsgdb3
-
MD5
5647736d5f4e843683641a36fc619849
-
SHA1
36ffba58a204e1b1b09f07d55bb3c8faa9004282
-
SHA256
6ecb9d22d6fa780cfd76b2d838bcb374360782d4b547e65f14e4fb1e08c59309
-
SHA512
84b1442c4403ba4997a6c386f35ca3be112cb216e1916058e1353f6dccf8ace03b580b149646a4cc1102bf1cdb73cadf7e0ba3341ee9ff5f3f18a250d117ceaa
Static task
static1
Behavioral task
behavioral1
Sample
6ecb9d22d6fa780cfd76b2d838bcb374360782d4b547e65f14e4fb1e08c59309.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6ecb9d22d6fa780cfd76b2d838bcb374360782d4b547e65f14e4fb1e08c59309.exe
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
6ecb9d22d6fa780cfd76b2d838bcb374360782d4b547e65f14e4fb1e08c59309
-
Size
1.8MB
-
MD5
5647736d5f4e843683641a36fc619849
-
SHA1
36ffba58a204e1b1b09f07d55bb3c8faa9004282
-
SHA256
6ecb9d22d6fa780cfd76b2d838bcb374360782d4b547e65f14e4fb1e08c59309
-
SHA512
84b1442c4403ba4997a6c386f35ca3be112cb216e1916058e1353f6dccf8ace03b580b149646a4cc1102bf1cdb73cadf7e0ba3341ee9ff5f3f18a250d117ceaa
Score10/10-
Detect Neshta Payload
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-