Overview
overview
9Static
static
3NekozRealistic.exe
windows10-1703-x64
9$PLUGINSDI...er.dll
windows10-1703-x64
3$PLUGINSDI...ls.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDI...ll.dll
windows10-1703-x64
3LICENSES.c...m.html
windows10-1703-x64
4NekozRealistic.exe
windows10-1703-x64
9d3dcompiler_47.dll
windows10-1703-x64
1ffmpeg.dll
windows10-1703-x64
1libEGL.dll
windows10-1703-x64
1libGLESv2.dll
windows10-1703-x64
1resources/elevate.exe
windows10-1703-x64
3vk_swiftshader.dll
windows10-1703-x64
1vulkan-1.dll
windows10-1703-x64
1$PLUGINSDI...ec.dll
windows10-1703-x64
3$PLUGINSDI...7z.dll
windows10-1703-x64
3$R0/Uninst...ic.exe
windows10-1703-x64
7$PLUGINSDI...ls.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDI...ll.dll
windows10-1703-x64
3$PLUGINSDI...ec.dll
windows10-1703-x64
3General
-
Target
NekozRealistic.exe
-
Size
88.2MB
-
Sample
240825-1rxd9ayfmr
-
MD5
59758e1bab5b620a8442c0b0f0dda33c
-
SHA1
93e81b63d5af1bbb46038700a352dcf62fc0c2ea
-
SHA256
fc73a8d480e2df68af2397d5912ef89731c12534eba4d1050bba72d7e6696093
-
SHA512
cccaa761026136c5deea21a0cb2209802142c31bf00edb7779c866c11837704b6744aea1b49cfe518a46dfd63c658195df2a70334c8efc4f88152d4c94811406
-
SSDEEP
1572864:wn+e4h7TL9BHyyzNLQJCXvSAEICyAgLlmN9ESFZ3EEPoks/XU:w+e4NxzKJCqiCyAgAfEgZ3Fokx
Static task
static1
Behavioral task
behavioral1
Sample
NekozRealistic.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
LICENSES.chromium.html
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
NekozRealistic.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
d3dcompiler_47.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
ffmpeg.dll
Resource
win10-20240611-en
Behavioral task
behavioral10
Sample
libEGL.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
libGLESv2.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
resources/elevate.exe
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
vk_swiftshader.dll
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
vulkan-1.dll
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
$R0/Uninstall NekozRealistic.exe
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
NekozRealistic.exe
-
Size
88.2MB
-
MD5
59758e1bab5b620a8442c0b0f0dda33c
-
SHA1
93e81b63d5af1bbb46038700a352dcf62fc0c2ea
-
SHA256
fc73a8d480e2df68af2397d5912ef89731c12534eba4d1050bba72d7e6696093
-
SHA512
cccaa761026136c5deea21a0cb2209802142c31bf00edb7779c866c11837704b6744aea1b49cfe518a46dfd63c658195df2a70334c8efc4f88152d4c94811406
-
SSDEEP
1572864:wn+e4h7TL9BHyyzNLQJCXvSAEICyAgLlmN9ESFZ3EEPoks/XU:w+e4NxzKJCqiCyAgAfEgZ3Fokx
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
$PLUGINSDIR/SpiderBanner.dll
-
Size
9KB
-
MD5
17309e33b596ba3a5693b4d3e85cf8d7
-
SHA1
7d361836cf53df42021c7f2b148aec9458818c01
-
SHA256
996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93
-
SHA512
1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298
-
SSDEEP
192:5lkE3uqRI1y7/xcfK4PRef6gQzJyY1rpKlVrw:5lkMBI1y7UKcef6XzJrpKY
Score3/10 -
-
-
Target
$PLUGINSDIR/StdUtils.dll
-
Size
100KB
-
MD5
c6a6e03f77c313b267498515488c5740
-
SHA1
3d49fc2784b9450962ed6b82b46e9c3c957d7c15
-
SHA256
b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
-
SHA512
9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
SSDEEP
3072:WNuZmJ9TDP3ahD2TF7Rq9cJNPhF9vyHf:WNuZ81zaAFHhF9v
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
0d7ad4f45dc6f5aa87f606d0331c6901
-
SHA1
48df0911f0484cbe2a8cdd5362140b63c41ee457
-
SHA256
3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
-
SHA512
c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
SSDEEP
192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6
Score3/10 -
-
-
Target
$PLUGINSDIR/WinShell.dll
-
Size
3KB
-
MD5
1cc7c37b7e0c8cd8bf04b6cc283e1e56
-
SHA1
0b9519763be6625bd5abce175dcc59c96d100d4c
-
SHA256
9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
-
SHA512
7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
Score3/10 -
-
-
Target
LICENSES.chromium.html
-
Size
8.8MB
-
MD5
2675b30d524b6c79b6cee41af86fc619
-
SHA1
407716c1bb83c211bcb51efbbcb6bf2ef1664e5b
-
SHA256
6a717038f81271f62318212f00b1a2173b9cb0cc435f984710ac8355eb409081
-
SHA512
3214341da8bf3347a6874535bb0ff8d059ee604e779491780f2b29172f9963e23acbe3c534d888f7a3b99274f46d0628962e1e72a5d3fc6f18ca2b62343df485
-
SSDEEP
24576:cpD6826x5kSWSsRinoHnmfm646a6N6z68SH4SApTJ:cHSek
Score4/10 -
-
-
Target
NekozRealistic.exe
-
Size
164.7MB
-
MD5
46487ecf384a1281ce454c7bc7240cd4
-
SHA1
d8cbb21dd6a0cd69c9c3a1ea6032e4b926d7299b
-
SHA256
ad1d7197467b6a19b2e86405a2bfe1451d2b9c6a876b97768d3116e4dcde43d0
-
SHA512
3d0adafb677634b8b495d6478ba28ea05ba8801701bcc179ac3ab5a18390cc0d8f54889863e6a04c0426689749c5549170f475a685a837d9049758bbf88305d4
-
SSDEEP
1572864:kl+CE2MQXWN/rdELTi/YA3kaz3lYMOyAwxLQOnblBeXZm/uGv2G2EkA/dyive45B:4UFwAY2le00pmHgr4
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
d3dcompiler_47.dll
-
Size
4.7MB
-
MD5
2191e768cc2e19009dad20dc999135a3
-
SHA1
f49a46ba0e954e657aaed1c9019a53d194272b6a
-
SHA256
7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d
-
SHA512
5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970
-
SSDEEP
49152:KCZnRO4XyM53Rkq4ypQqdoRpmruVNYvkaRwvhiD0N+YEzI4og/RfzHLeHTRhFRNc:xG2QCwmHPnog/pzHAo/A6l
Score1/10 -
-
-
Target
ffmpeg.dll
-
Size
2.8MB
-
MD5
003621dec0f1bb3198c3767f92703d4c
-
SHA1
846dba74ff39920c3f8a0312f89b2fbc2acb6c55
-
SHA256
84482be78116676e174d0c5b7e0ec7873b4aa23d31633a81ad70c9b6f4e7a30f
-
SHA512
14ac4ded9f74669993ad113c02908b2c3160fe6a0e1d0e649ca89f980986650499b142433ab27acf573f40000ce879149f7555ea79ee12c3a464410f74d2dc9d
-
SSDEEP
49152:zF5qb84KtStWEK/Ju2lf3tAtiLHQVTf6yfcrhCHDXLl8+0LKSQESCu:zFvSkJXv+tiLAD0+DES5
Score1/10 -
-
-
Target
libEGL.dll
-
Size
477KB
-
MD5
62c210fb30a6cd478415978a92df4549
-
SHA1
a6b962105a045df609fe9ca952e0cfe3da842650
-
SHA256
5771f67ba551ebe2a808d1718d76fd05a96447420d9d44ed32c7809af81d2bee
-
SHA512
16bbfdbaef1711d883aee6c1e6409b13bcb1d03486863f2017c381703489f8706a89353cfce20778376fec9f0f993e0127aec293efed70687a6c7db2d1ecc33f
-
SSDEEP
6144:B8hd1BSjuMmof2SEXVVfgV8hxN7h2NbIEOg51f0FticyQ:B8DXSjZmof2SEsmN12NbIE7f0FticyQ
Score1/10 -
-
-
Target
libGLESv2.dll
-
Size
7.3MB
-
MD5
fa35c62a428d613036df7b998778aca5
-
SHA1
09edd0595055e11929c3c2e5a938f88f1f12caf7
-
SHA256
ab5adaa1fa2c83bcfa87e421b3455d212e43e2f7f19fa51d620653618b29419e
-
SHA512
5d8974db0fa818980aef19fe6d73fc616ff6e30c4175eaefca4e62c3c418f3c5872965bacdf343943d8f5a0c62f4e0e7185269d476f040ebe7767987dd0c70f8
-
SSDEEP
98304:znbalIu/BrsXHXnvV9AcDoyGDHnSHQZ3rA:znGG0BMXBDerr
Score1/10 -
-
-
Target
resources/elevate.exe
-
Size
105KB
-
MD5
792b92c8ad13c46f27c7ced0810694df
-
SHA1
d8d449b92de20a57df722df46435ba4553ecc802
-
SHA256
9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37
-
SHA512
6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40
-
SSDEEP
3072:1bLnrwQoRDtdMMgSXiFJWcIgUVCfRjV/GrWl:1PrwRhte1XsE1l
Score3/10 -
-
-
Target
vk_swiftshader.dll
-
Size
4.9MB
-
MD5
6d4ed7404de831bfdbf9bed5a0806b9f
-
SHA1
d40fd8fe8dca45ce09b9101eeecb2be6f9681085
-
SHA256
ede42b2b9191b18cea5a63939fec682bbbf8c69133485303d26c50ec4f10930d
-
SHA512
bd7cefd760ee9ea4f0e39dc779c427fcf927b907986e34176583a5101c60714fa653a221d77cd8c5b973cb515008a7335b15fa84df33f7bfc573af7a807370c1
-
SSDEEP
49152:P6h3a0f1ABi1jP9LoS8lne0Zv8EgHI7JXYN3bgFNmEgMYmz2qA0Mr7wsVUsNCOzN:Sh3aMXoSHfPwksHldLiuNr
Score1/10 -
-
-
Target
vulkan-1.dll
-
Size
931KB
-
MD5
bffe91743ec8bbd1b1c64e43f1363726
-
SHA1
fe863f1bd00b7cc952f359e98967989cf2f66566
-
SHA256
1d1f2f47c7369c9416705c4bdf5fd9235174bdcc065c9a85c8495101d8b60490
-
SHA512
881e79791408d60e994bb694ff7d81e1e12fbdbb4d47358067ac980380e07d67701fef72b65b6e0d4dd0ecc32cab2fd17fc5d2f0e9798bc3073c415efc0cd9ae
-
SSDEEP
24576:bYWOq/4Kt/Ku8n387ecbFb6Z5WoDYsHY6g3P0zAk7sx:bY65/M387R56Z5WoDYsHY6g3P0zAk7s
Score1/10 -
-
-
Target
$PLUGINSDIR/nsExec.dll
-
Size
6KB
-
MD5
ec0504e6b8a11d5aad43b296beeb84b2
-
SHA1
91b5ce085130c8c7194d66b2439ec9e1c206497c
-
SHA256
5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962
-
SHA512
3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57
-
SSDEEP
96:YjHFiKaoggCtJzTlKXb0tbo68qD853Ns7GgmkNq3m+s:JbogRtJzTlNR8qD85uGgmkNr
Score3/10 -
-
-
Target
$PLUGINSDIR/nsis7z.dll
-
Size
424KB
-
MD5
80e44ce4895304c6a3a831310fbf8cd0
-
SHA1
36bd49ae21c460be5753a904b4501f1abca53508
-
SHA256
b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
-
SHA512
c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df
-
SSDEEP
6144:aUWQQ5O3fz0NG3ucDaEUTWfk+ZA0NrCL/k+uyoyBOX1okfW7w+Pfzqibckl:an5QEG39fPAkrE4yrBOXDfaNbck
Score3/10 -
-
-
Target
$R0/Uninstall NekozRealistic.exe
-
Size
147KB
-
MD5
cc9c7f42944d1943040417ae00a932fb
-
SHA1
694c20050a103d4e2afd3cc6c440fc9d81466177
-
SHA256
7cdceac06ed3ec7bc93492f3ec3e3733bff717b66c68f083301f8eef11aafa69
-
SHA512
0ce06a8013fee1c25905f12f90d0bbc4c49dd826faa5b86e531a75aa05d94dfd51006ec3fec15892ce051cc6775858f65e33b783c20a9fca76215edc2cda00e0
-
SSDEEP
3072:gn77v00hEoDEtaupSeqPKg5WOqpf0iw00yaH2tvhOEA1RJCir86SrSrv6Ia3c:g740I5SJZEpf0ys2t0EyL+yaM
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
$PLUGINSDIR/StdUtils.dll
-
Size
100KB
-
MD5
c6a6e03f77c313b267498515488c5740
-
SHA1
3d49fc2784b9450962ed6b82b46e9c3c957d7c15
-
SHA256
b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
-
SHA512
9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
SSDEEP
3072:WNuZmJ9TDP3ahD2TF7Rq9cJNPhF9vyHf:WNuZ81zaAFHhF9v
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
0d7ad4f45dc6f5aa87f606d0331c6901
-
SHA1
48df0911f0484cbe2a8cdd5362140b63c41ee457
-
SHA256
3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
-
SHA512
c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
SSDEEP
192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6
Score3/10 -
-
-
Target
$PLUGINSDIR/WinShell.dll
-
Size
3KB
-
MD5
1cc7c37b7e0c8cd8bf04b6cc283e1e56
-
SHA1
0b9519763be6625bd5abce175dcc59c96d100d4c
-
SHA256
9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
-
SHA512
7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
Score3/10 -
-
-
Target
$PLUGINSDIR/nsExec.dll
-
Size
6KB
-
MD5
ec0504e6b8a11d5aad43b296beeb84b2
-
SHA1
91b5ce085130c8c7194d66b2439ec9e1c206497c
-
SHA256
5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962
-
SHA512
3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57
-
SSDEEP
96:YjHFiKaoggCtJzTlKXb0tbo68qD853Ns7GgmkNq3m+s:JbogRtJzTlNR8qD85uGgmkNr
Score3/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1