Static task
static1
Behavioral task
behavioral1
Sample
311d0b7e6bf359f76592cd02483eddd53e27ae4583162cff364c7d1d857d5b97.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
311d0b7e6bf359f76592cd02483eddd53e27ae4583162cff364c7d1d857d5b97.exe
Resource
win10v2004-20220414-en
General
-
Target
311d0b7e6bf359f76592cd02483eddd53e27ae4583162cff364c7d1d857d5b97
-
Size
2.5MB
-
MD5
2ed88332567056bfef2764f5adc6dfc0
-
SHA1
b7ad555c0ce377f5484950d0c374ffcc7f56d974
-
SHA256
311d0b7e6bf359f76592cd02483eddd53e27ae4583162cff364c7d1d857d5b97
-
SHA512
2cfccd0f056c598ddf584362c2b24b7fa7ef505a31bfe6b3d91a901ccb8cc66e49321afbcf1af081b9994845bf1b521b0ad381667eb9337de0f360df91c1b6de
-
SSDEEP
49152:pITe1ItLD2qOVM9q9QhRp8Xbo5AaT0cCRX97q:3GpaqQKQyuo5PT0O
Malware Config
Signatures
-
Detect Neshta Payload 1 IoCs
Processes:
resource yara_rule sample family_neshta -
Neshta family
Files
-
311d0b7e6bf359f76592cd02483eddd53e27ae4583162cff364c7d1d857d5b97.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 42KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ