General
-
Target
SOA.exe
-
Size
1.9MB
-
Sample
220809-qszwnacfc4
-
MD5
081ccbaad04fe1298a6cd6b04c63fd14
-
SHA1
87a31f4f90543f69f37fdcf7d0a4d8d5ca99de08
-
SHA256
888101d59c219dc57cf3bec1dec7f3880bfb2e6d966da604eb2485741d72f889
-
SHA512
e66b75dd580a3c60b418477e5e960b3893b12882981d4df71515262e0ea5c3062230d9d597c0b866c241a670961d124b5fa5f9052e20514b22642bcb9a7688b3
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
SOA.exe
-
Size
1.9MB
-
MD5
081ccbaad04fe1298a6cd6b04c63fd14
-
SHA1
87a31f4f90543f69f37fdcf7d0a4d8d5ca99de08
-
SHA256
888101d59c219dc57cf3bec1dec7f3880bfb2e6d966da604eb2485741d72f889
-
SHA512
e66b75dd580a3c60b418477e5e960b3893b12882981d4df71515262e0ea5c3062230d9d597c0b866c241a670961d124b5fa5f9052e20514b22642bcb9a7688b3
Score10/10-
Detect Neshta payload
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-