Overview
overview
9Static
static
3nazimodpc-v3.5.zip
windows7-x64
8nazimodpc-v3.5.zip
windows10-2004-x64
8nazimod-loader.exe
windows7-x64
1nazimod-loader.exe
windows10-2004-x64
9nazimod-log.txt
windows7-x64
1nazimod-log.txt
windows10-2004-x64
1nazimod-runtime.dll
windows7-x64
1nazimod-runtime.dll
windows10-2004-x64
1General
-
Target
nazimodpc-v3.5.zip
-
Size
861KB
-
Sample
240815-2fw5saydre
-
MD5
fef5fc205500bc37f3530fcf3d7b0af1
-
SHA1
2d3b8719a1c2588016f52746bbc21bddd3453bf9
-
SHA256
5c11386f2616660c93a5952cdf1a2ba2674792d2b13c8d0c539282b4e8e72679
-
SHA512
c15a539facba8ce6ad6b72d53e6b8e28af95115638fbfe3340f0b9f8b5433ebf2a8fc15388559061d635f57950e35d50f0773dd5e3b99cfdf571bad10b6ec2ec
-
SSDEEP
24576:2kepxznWbwK9VDbBUgezxKamBp4oS6a8lJWqxbQu+aSn:PyzWsK9VbfKsVphrJWIbQu+R
Static task
static1
Behavioral task
behavioral1
Sample
nazimodpc-v3.5.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
nazimodpc-v3.5.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
nazimod-loader.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
nazimod-loader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
nazimod-log.txt
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
nazimod-log.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
nazimod-runtime.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
nazimod-runtime.dll
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
nazimodpc-v3.5.zip
-
Size
861KB
-
MD5
fef5fc205500bc37f3530fcf3d7b0af1
-
SHA1
2d3b8719a1c2588016f52746bbc21bddd3453bf9
-
SHA256
5c11386f2616660c93a5952cdf1a2ba2674792d2b13c8d0c539282b4e8e72679
-
SHA512
c15a539facba8ce6ad6b72d53e6b8e28af95115638fbfe3340f0b9f8b5433ebf2a8fc15388559061d635f57950e35d50f0773dd5e3b99cfdf571bad10b6ec2ec
-
SSDEEP
24576:2kepxznWbwK9VDbBUgezxKamBp4oS6a8lJWqxbQu+aSn:PyzWsK9VbfKsVphrJWIbQu+R
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
nazimod-loader.exe
-
Size
133KB
-
MD5
547ad33fd7233cfaccaca04c8b2b4d02
-
SHA1
115ba523b091dc9d8f5d223a3eeca9db1b8e2805
-
SHA256
e7999975233ccb9ade894b5a6a79ba1b62b321b270bc879274852f05a4e154f3
-
SHA512
56e84f1ce179ae7db42bb288591de952fbd80a1c0a19e0aacf9aded80477e5ba57333fd0259233a368a1b0d0d92ace05ae4b6813000a6eec83ad4fe36c9d6799
-
SSDEEP
3072:jnN7O9r9fDpv72LhyZ8YKe6eO/uoDbvJAXphZBXwpg8bUgg:cPe+2bvaphPwpg8A
-
Renames multiple (6027) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
nazimod-log.txt
-
Size
533B
-
MD5
a03b100955735bb79e79308c4ab1e66f
-
SHA1
ece1d6aa26985d2a0c391484e364dd10a6917289
-
SHA256
35587a9f8127d047e706f16f63db0f020803ba30a8e54a633bb810ac2ffebce7
-
SHA512
5c433be1b3f44a4ac075034f7d4cf961eabb7ebfa9bac3e3f136eec028874e8116615808d8c5b15eb59e02b83425008e8b75acafb6fe77aa4c3ac7a99b7233f9
Score1/10 -
-
-
Target
nazimod-runtime.dll
-
Size
2.9MB
-
MD5
860ee11ac5e2009f5956bcd9caf08faf
-
SHA1
4d95cdfc082ba2a42f0a148e9b49a12589afac15
-
SHA256
b3dc46bbb59cfd7c64200eb75e7d0d63bcc48204c063a49a470045bd20315093
-
SHA512
93cf9e4cdd16b4483131a83075596952833b845ea8febde549966ca189b9d31a056267b342f45ea62f342465be7911b4ea66db09d9503a747f49aa867de54b87
-
SSDEEP
24576:CeN7gwjYGCKqQzfOR21bi0LsWb7RZnBYa42yleH67j63cP:C40wjYG+Exbi0oW/RZnu02
Score1/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1