Behavioral task
behavioral1
Sample
5e9bc7c0a96d7e74528bb36a0b87be926174824ee067f29ea133de529bbbd6d6.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5e9bc7c0a96d7e74528bb36a0b87be926174824ee067f29ea133de529bbbd6d6.exe
Resource
win10v2004-20220722-en
General
-
Target
5e9bc7c0a96d7e74528bb36a0b87be926174824ee067f29ea133de529bbbd6d6
-
Size
180KB
-
MD5
655fb8597c6653b928f6b2fe13f70730
-
SHA1
891b8521e1aa78caa05efea6bf5772570ac8835c
-
SHA256
5e9bc7c0a96d7e74528bb36a0b87be926174824ee067f29ea133de529bbbd6d6
-
SHA512
2b0b5afb0998e915d5ec7dafb31a927e34b35ff1346c1bc4a31148cc13ad7ae704d33eb528cf7207ffc8287cf8ab52c5e1e972682135864ad593795d28f55117
-
SSDEEP
3072:sr85CpustyhZFChcssc56FUrgxvbSD4UQrO27TE9O3NAhGCLOX:k9pRhcHUa7w9qNYE
Malware Config
Signatures
-
Detect Neshta payload 1 IoCs
Processes:
resource yara_rule sample family_neshta -
Neshta family
Files
-
5e9bc7c0a96d7e74528bb36a0b87be926174824ee067f29ea133de529bbbd6d6.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 42KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ