General

  • Target

    Hamachi.exe

  • Size

    14.6MB

  • Sample

    230702-vcpszadc8z

  • MD5

    3a45b09b420116bd55a7edbf556d9a85

  • SHA1

    426bea0d4af78200a481b55a71907c4e0e9f0fd7

  • SHA256

    432444053645ece146442250d5633ad00d719f2217a16770e00794f473bf8275

  • SHA512

    f4253df0f358b196bb03efdaa06284235e0926dc380763957bf966384809209a0fe1dbb62e6d75966d452240e66bd6e1a6f513cc73d4f66eea01df3b93a54b78

  • SSDEEP

    393216:LKrrCfLDdHEi+4+zWnPDmf1wXH7UP0roV7KZczTs:8uXdkRtinKf1w3fr0KqTs

Malware Config

Targets

    • Target

      Hamachi.exe

    • Size

      14.6MB

    • MD5

      3a45b09b420116bd55a7edbf556d9a85

    • SHA1

      426bea0d4af78200a481b55a71907c4e0e9f0fd7

    • SHA256

      432444053645ece146442250d5633ad00d719f2217a16770e00794f473bf8275

    • SHA512

      f4253df0f358b196bb03efdaa06284235e0926dc380763957bf966384809209a0fe1dbb62e6d75966d452240e66bd6e1a6f513cc73d4f66eea01df3b93a54b78

    • SSDEEP

      393216:LKrrCfLDdHEi+4+zWnPDmf1wXH7UP0roV7KZczTs:8uXdkRtinKf1w3fr0KqTs

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks