General
-
Target
5cedd6e36c3bffb72914dc516521b82688e10de9dd380e4147c7dbd884e22392
-
Size
1.8MB
-
Sample
220205-fg8z3sgdg8
-
MD5
b0f478fe69ea41ebd85f950b5fd69ac0
-
SHA1
cf7176cd33307da64ed034a26324beef6974f498
-
SHA256
5cedd6e36c3bffb72914dc516521b82688e10de9dd380e4147c7dbd884e22392
-
SHA512
10a2cc3bd887008935576229d9cd3348b42f53ba87e99e05ce1397a00d91ea81370be8167e25b676aa2aa12dfb0c636e0a951bc3e2a1e110cd68bb63962a6097
Static task
static1
Behavioral task
behavioral1
Sample
5cedd6e36c3bffb72914dc516521b82688e10de9dd380e4147c7dbd884e22392.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
5cedd6e36c3bffb72914dc516521b82688e10de9dd380e4147c7dbd884e22392.exe
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
5cedd6e36c3bffb72914dc516521b82688e10de9dd380e4147c7dbd884e22392
-
Size
1.8MB
-
MD5
b0f478fe69ea41ebd85f950b5fd69ac0
-
SHA1
cf7176cd33307da64ed034a26324beef6974f498
-
SHA256
5cedd6e36c3bffb72914dc516521b82688e10de9dd380e4147c7dbd884e22392
-
SHA512
10a2cc3bd887008935576229d9cd3348b42f53ba87e99e05ce1397a00d91ea81370be8167e25b676aa2aa12dfb0c636e0a951bc3e2a1e110cd68bb63962a6097
Score10/10-
Detect Neshta Payload
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-