General
-
Target
0x000b000000012302-60.dat
-
Size
240KB
-
Sample
220806-pma5nshaf5
-
MD5
fb89428c77f974f5c1a131bbece97af0
-
SHA1
9869ea531f5fe38592e706d3f08493eacb1a6a24
-
SHA256
10b55c2169ea6cd93a60641ef69b714010eac3383f6f9d127356d064a8be62d2
-
SHA512
27d0fb7998ba5eec89e1ff2b45362f60982d8f8f9050e2c6bc7df517a3307c07375b9a5a113f5fcea6ebe8e1829ed51affc6186db99ae6a966922634a32cfa28
Behavioral task
behavioral1
Sample
0x000b000000012302-60.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
0x000b000000012302-60.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
oski
rgjeweller.mu/oski/
Targets
-
-
Target
0x000b000000012302-60.dat
-
Size
240KB
-
MD5
fb89428c77f974f5c1a131bbece97af0
-
SHA1
9869ea531f5fe38592e706d3f08493eacb1a6a24
-
SHA256
10b55c2169ea6cd93a60641ef69b714010eac3383f6f9d127356d064a8be62d2
-
SHA512
27d0fb7998ba5eec89e1ff2b45362f60982d8f8f9050e2c6bc7df517a3307c07375b9a5a113f5fcea6ebe8e1829ed51affc6186db99ae6a966922634a32cfa28
-
Detect Neshta payload
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-