Behavioral task
behavioral1
Sample
Neon v2/Neon v2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Neon v2/Neon v2.exe
Resource
win10v2004-20230703-en
General
-
Target
Neon v2.rar
-
Size
103KB
-
MD5
f38b27745d24cc16c2d3c6e5fe933e7e
-
SHA1
bfc30c46362584622a863cf153ef8eabeb838c6f
-
SHA256
b1e22731feaa39630fdc4ce2f145dee3984d5c8ec57e67d681c2bec7c0c3ebc9
-
SHA512
a43beb185f76b8503bc8768e8477b827fb2a7faa317fc52de758c43ab82f3484415077450a29596f9c0087a5d637888c8d0514218750fc5f35c0fd777a666ccf
-
SSDEEP
1536:/vs6Xqj51478GgTnDdwsJ1RDJiXIAD1eAvG5FpvouWfx6s5/GkK1iPzimAuRExbw:XkkgTDdwsJDBLiWQss8uziCRE1A/CM
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/956477791124205569/zhz-iUwTtwf3ND8UdSeoNmdX8X4ElZBSxqhFrwstZ6oV5o-CWZxANYz737UasCARyImg
Signatures
-
44caliber family
-
Processes:
resource yara_rule static1/unpack001/Neon v2/Neon v2.exe INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/Neon v2/Neon v2.exe
Files
-
Neon v2.rar.rar
-
Neon v2/Neon v2.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 272KB - Virtual size: 271KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ