General
-
Target
tmp
-
Size
213KB
-
Sample
220701-wq4pqacab3
-
MD5
d1d7d03657527f1fb06fbba2d76b4000
-
SHA1
e56e350419d54f808a5f8b53101ef34a3a741dfc
-
SHA256
fb0288ade7c7b4b3a2b660fed3c19d8c9c1eafe7e6f8e11eeb1ed01487d13f52
-
SHA512
47111e81e6cfa7133099f95acb7001d0682ab3c324ad28bd064d6aaceeabfabe9dbbb2bc6c94bf4d5b766850f20667252814fb8423e94481c0e63b8ef42931ad
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
tmp
-
Size
213KB
-
MD5
d1d7d03657527f1fb06fbba2d76b4000
-
SHA1
e56e350419d54f808a5f8b53101ef34a3a741dfc
-
SHA256
fb0288ade7c7b4b3a2b660fed3c19d8c9c1eafe7e6f8e11eeb1ed01487d13f52
-
SHA512
47111e81e6cfa7133099f95acb7001d0682ab3c324ad28bd064d6aaceeabfabe9dbbb2bc6c94bf4d5b766850f20667252814fb8423e94481c0e63b8ef42931ad
Score10/10-
Detect Neshta Payload
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-