Static task
static1
Behavioral task
behavioral1
Sample
71037728ddcea1b094b4bc48fa92b2a0895f009f17e0e9354a3dc5fb0077e8bc.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
71037728ddcea1b094b4bc48fa92b2a0895f009f17e0e9354a3dc5fb0077e8bc.exe
Resource
win10v2004-en-20220113
General
-
Target
71037728ddcea1b094b4bc48fa92b2a0895f009f17e0e9354a3dc5fb0077e8bc
-
Size
761KB
-
MD5
f197a5709bab2c42314d318e545a6bc9
-
SHA1
595fc6595040809e3e15460d0b4e313896629f7d
-
SHA256
7eedffcd0658cb23b499134305a7b292d9bbd526ad9df6b7b920a4f8bbd01120
-
SHA512
6b1b93920717b2caceb3aaf51421c2152a966819b6b04aa3dcfac864fb9318a486e1edaf3fa4829160b17678d0975b4a9621f6b11c9bd56535d0e0c86b9509b9
-
SSDEEP
12288:XBO9L2N1WZCkf3x+noxx6LsfSROIHTOG9+k1cLoiTLlDRIbG5YJX1vLz/vCWV0PR:XBcLPX+oxx6B/T19+xvlDRylDrIW2HB
Malware Config
Signatures
-
Detect Neshta Payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/71037728ddcea1b094b4bc48fa92b2a0895f009f17e0e9354a3dc5fb0077e8bc family_neshta -
Neshta family
Files
-
71037728ddcea1b094b4bc48fa92b2a0895f009f17e0e9354a3dc5fb0077e8bc.zip
-
71037728ddcea1b094b4bc48fa92b2a0895f009f17e0e9354a3dc5fb0077e8bc.exe windows x86
Code Sign
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 42KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ