Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
2023-08-22_e82c5e5d888935b99f1d4404eee4d63f_locker-goga_neshta_JC.exe
-
Size
1.2MB
-
Sample
230903-q8eknaad2z
-
MD5
e82c5e5d888935b99f1d4404eee4d63f
-
SHA1
e1ceef1881c0b59b7f8c46c4009cf8188ba3a369
-
SHA256
c75d27311d7c5271e0a415bf0e4d62da7e4567c38711cc003892884dfeb3b331
-
SHA512
fd426a5bf0b1a5de8e50c6fc5ebe3eafe038d6317372874ea6a2277975403eb9c269834735226b5ab998107ef9f8333411f34cdab0893c1c3665a5277568e229
-
SSDEEP
24576:W5Rt4El7fc/TFJzjJUgrrCq5sNIwQsUGy1q7a9DlIACTp+kqGslRG4s:Wjt4El7fc/TFJWstwQsPdSDuACTpqhGv
Behavioral task
behavioral1
Sample
2023-08-22_e82c5e5d888935b99f1d4404eee4d63f_locker-goga_neshta_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_e82c5e5d888935b99f1d4404eee4d63f_locker-goga_neshta_JC.exe
Resource
win10v2004-20230831-en
Malware Config
Extracted
C:\Users\Public\Desktop\README_LOCKED.txt
Targets
-
-
Target
2023-08-22_e82c5e5d888935b99f1d4404eee4d63f_locker-goga_neshta_JC.exe
-
Size
1.2MB
-
MD5
e82c5e5d888935b99f1d4404eee4d63f
-
SHA1
e1ceef1881c0b59b7f8c46c4009cf8188ba3a369
-
SHA256
c75d27311d7c5271e0a415bf0e4d62da7e4567c38711cc003892884dfeb3b331
-
SHA512
fd426a5bf0b1a5de8e50c6fc5ebe3eafe038d6317372874ea6a2277975403eb9c269834735226b5ab998107ef9f8333411f34cdab0893c1c3665a5277568e229
-
SSDEEP
24576:W5Rt4El7fc/TFJzjJUgrrCq5sNIwQsUGy1q7a9DlIACTp+kqGslRG4s:Wjt4El7fc/TFJWstwQsPdSDuACTpqhGv
-
Detect Neshta payload
-
LockerGoga
LockerGoga is a ransomware that is primarily used in targeted, disruptive attacks.
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Renames multiple (1602) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (516) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-