Behavioral task
behavioral1
Sample
37ee2fdf0db891e4ce3ad879e5515852f62962cacacf14adda10d845e6734ed6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
37ee2fdf0db891e4ce3ad879e5515852f62962cacacf14adda10d845e6734ed6.exe
Resource
win10v2004-20221111-en
General
-
Target
37ee2fdf0db891e4ce3ad879e5515852f62962cacacf14adda10d845e6734ed6
-
Size
241KB
-
MD5
12d2714582684e9189ac657a4c088c50
-
SHA1
1a504e1358a1957db6a2bb5cc11bb3256fb6f017
-
SHA256
37ee2fdf0db891e4ce3ad879e5515852f62962cacacf14adda10d845e6734ed6
-
SHA512
fb1081f09245b1b3c7e71351cb3bda3f442059a19a264f05c02f99b89962f201fefaf5c19b583b8fe7e5500fe1ef88ede9851d861fd471f0d840274568980f48
-
SSDEEP
6144:k9R7SuIhm1swwa2Uv9ZlXVR66IvUL8eJLPzRMZoEii:4281nVbFXVR66IvUL8eJLbRMZoEii
Malware Config
Signatures
-
Detect Neshta payload 1 IoCs
resource yara_rule sample family_neshta -
Neshta family
Files
-
37ee2fdf0db891e4ce3ad879e5515852f62962cacacf14adda10d845e6734ed6.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 536B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 42KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ