General
-
Target
e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c.zip
-
Size
474KB
-
Sample
230530-mda27sha35
-
MD5
c48faa4f3a0371948e40c1dac4d76a10
-
SHA1
a91501d766322a52a87919e16a9696182e48193f
-
SHA256
956489f1f1a6e2b08c8d032cd0cf0ecc6545c638fdb046ddc418c83354152fad
-
SHA512
a1485a343d225e92fdf4505957c73eb1dae1dde3cffeb12d46ad65f6db1ed78887402208ee84ad39f1bad5f124bf7144c1f1ee65c1729cbefed252916c040628
-
SSDEEP
12288:oOvsarPDGujOpXlsRvXkciBQbNJKS/i/4l0T8ZG/VkZyc:0GPDGWOp1kkck0e4uTUUVkZyc
Behavioral task
behavioral1
Sample
e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c.exe
Resource
win7-20230220-en
Malware Config
Extracted
limerat
1LLUV51XQKqq94X965Cc6uGPXeZEGSqCdV
-
aes_key
NYANCAT
-
antivm
false
-
c2_url
https://pastebin.com/raw/4pByu6u5
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Targets
-
-
Target
e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c.exe
-
Size
781KB
-
MD5
5ddfbddf74d9e09bf434940362019979
-
SHA1
595d69d9fc35b83cd8d6567e88ab6526582576e4
-
SHA256
e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c
-
SHA512
6fcf4f5c573986cf5ae881812bf692a4d76683d636e4a7211111fc37f11e7ac8998dc98177b3efbbbf36ffd61346fa0aa5853231ee8337816ab7585ee4b9b693
-
SSDEEP
12288:fClBbX5Ty5syL0CR8gotz/S31L/5C9RJl7ICfLcpy:faUxLPigotulL/I9RACfLco
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-