General
-
Target
MrsMajor.exe
-
Size
2.0MB
-
Sample
220528-ll38aacga8
-
MD5
d618f786ce4fab3de2bed530dc0e6850
-
SHA1
6911db959f48b2fcfdecf12f52d31ec672488a5b
-
SHA256
19b1e8a417e6a3092a74f776298efda14dfe7278a36ef9d7317860766f536a35
-
SHA512
b1f681d31cda1d6ddeef883c220fb9b450670bd8e3795b740f4e1cd9d988239e8140703ddd9030eee2da97681f41fedc3be3b5f3c72dc9fe796be9eb6daece1f
Static task
static1
Malware Config
Targets
-
-
Target
MrsMajor.exe
-
Size
2.0MB
-
MD5
d618f786ce4fab3de2bed530dc0e6850
-
SHA1
6911db959f48b2fcfdecf12f52d31ec672488a5b
-
SHA256
19b1e8a417e6a3092a74f776298efda14dfe7278a36ef9d7317860766f536a35
-
SHA512
b1f681d31cda1d6ddeef883c220fb9b450670bd8e3795b740f4e1cd9d988239e8140703ddd9030eee2da97681f41fedc3be3b5f3c72dc9fe796be9eb6daece1f
-
Detect Neshta Payload
-
Modifies WinLogon for persistence
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-