General
-
Target
018a0cfe677b7b1e7697dd37b9eab1e040d93967e58cf3a850d48e0bf8f2c7c3
-
Size
135KB
-
Sample
230915-s12fkaga24
-
MD5
0f53727f9996f49e6034837b3622ce12
-
SHA1
9b167fab68afa5efc417537b4d6b9a3cf028d614
-
SHA256
018a0cfe677b7b1e7697dd37b9eab1e040d93967e58cf3a850d48e0bf8f2c7c3
-
SHA512
30bb029d98fec5ee4a5caf877614722c3865a259489c4593f1bd2be872b4a55b1f73299627c4f681b694fb7affa9caa5460ca5c4bd6933bf9f15b369a11e91ca
-
SSDEEP
768:eyxqjQl/EMQt4Oei7RwsHxyP7nbxzOQdJaf8S0pAG6XCwDfPMWosI45NbFdwjJw:JxqjQ+P04wsmJCKpQCwDHM1sV/Tw1w
Behavioral task
behavioral1
Sample
018a0cfe677b7b1e7697dd37b9eab1e040d93967e58cf3a850d48e0bf8f2c7c3.exe
Resource
win7-20230831-en
Malware Config
Extracted
limerat
-
aes_key
key
-
antivm
false
-
c2_url
https://pastebin.com/raw/0hCeb1Ba
-
delay
3
-
download_payload
true
-
install
true
-
install_name
powersnap.exe
-
main_folder
AppData
-
payload_url
https://usdt-flasher.shop/Flash-USDT-Sender.zip
-
pin_spread
true
-
sub_folder
\
-
usb_spread
true
Targets
-
-
Target
018a0cfe677b7b1e7697dd37b9eab1e040d93967e58cf3a850d48e0bf8f2c7c3
-
Size
135KB
-
MD5
0f53727f9996f49e6034837b3622ce12
-
SHA1
9b167fab68afa5efc417537b4d6b9a3cf028d614
-
SHA256
018a0cfe677b7b1e7697dd37b9eab1e040d93967e58cf3a850d48e0bf8f2c7c3
-
SHA512
30bb029d98fec5ee4a5caf877614722c3865a259489c4593f1bd2be872b4a55b1f73299627c4f681b694fb7affa9caa5460ca5c4bd6933bf9f15b369a11e91ca
-
SSDEEP
768:eyxqjQl/EMQt4Oei7RwsHxyP7nbxzOQdJaf8S0pAG6XCwDfPMWosI45NbFdwjJw:JxqjQ+P04wsmJCKpQCwDHM1sV/Tw1w
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-