General
-
Target
d03b6480f718736bb08a677f951f067ad189e7d2c1f55a0c75336861bb96fa72
-
Size
120KB
-
Sample
240501-nwensaea6y
-
MD5
a2b30b078b6186f9865e7953a3adf1b6
-
SHA1
e2e3869b82737a7c7b066ab33e785b8341be0628
-
SHA256
d03b6480f718736bb08a677f951f067ad189e7d2c1f55a0c75336861bb96fa72
-
SHA512
00e59b330c4ae304be3db8b9c4578530c58f2d7f6730e1c64e0b7cfb00db0c29d6fecb10a54ab91374d7a8944711e7801c0ffa91f5dec247fe96a0b41460abba
-
SSDEEP
3072:sr85CUsrQLOJgY8Zp8LHD4XWaNH71dLdG1iiFM2HrN/Dn:k9UsrQLOJgpZp8LHD4GaNH71dLdGiiFj
Behavioral task
behavioral1
Sample
d03b6480f718736bb08a677f951f067ad189e7d2c1f55a0c75336861bb96fa72.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d03b6480f718736bb08a677f951f067ad189e7d2c1f55a0c75336861bb96fa72.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
C:\PerfLogs\Admin\readme_for_unlock.txt
https://gdpr-info.eu/
http://cizedkjfk5zpiwnsxjjwllh2tfiwjttyrazi3spp6vairdkx52ydaqid.onion
Targets
-
-
Target
d03b6480f718736bb08a677f951f067ad189e7d2c1f55a0c75336861bb96fa72
-
Size
120KB
-
MD5
a2b30b078b6186f9865e7953a3adf1b6
-
SHA1
e2e3869b82737a7c7b066ab33e785b8341be0628
-
SHA256
d03b6480f718736bb08a677f951f067ad189e7d2c1f55a0c75336861bb96fa72
-
SHA512
00e59b330c4ae304be3db8b9c4578530c58f2d7f6730e1c64e0b7cfb00db0c29d6fecb10a54ab91374d7a8944711e7801c0ffa91f5dec247fe96a0b41460abba
-
SSDEEP
3072:sr85CUsrQLOJgY8Zp8LHD4XWaNH71dLdG1iiFM2HrN/Dn:k9UsrQLOJgpZp8LHD4GaNH71dLdGiiFj
Score10/10-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Renames multiple (381) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-