Behavioral task
behavioral1
Sample
a4dfca6c9d268bdfa68296228d00a5ed4085f55eb143c6f97acc4b5966f000a0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a4dfca6c9d268bdfa68296228d00a5ed4085f55eb143c6f97acc4b5966f000a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a4dfca6c9d268bdfa68296228d00a5ed4085f55eb143c6f97acc4b5966f000a0N
-
Size
399KB
-
MD5
2ff3f61b8416de20af5c512c3bfc9820
-
SHA1
6170ff05d3380a0f20903229ee9fb6e63cc254f8
-
SHA256
a4dfca6c9d268bdfa68296228d00a5ed4085f55eb143c6f97acc4b5966f000a0
-
SHA512
229557ab351c48e0c15f66c7ebeae58cd82de0b0ed995378d5222c1dd0255a7826b835787804e344f73b00f07abe462a520b3012f8f53e685f2b8d5373a36afb
-
SSDEEP
6144:g9uauhtlIe3svDsC2u15KPJ3X9F9W9h9:GyIe87Rh58
Malware Config
Signatures
-
Detect Neshta payload 1 IoCs
resource yara_rule sample family_neshta -
Neshta family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4dfca6c9d268bdfa68296228d00a5ed4085f55eb143c6f97acc4b5966f000a0N
Files
-
a4dfca6c9d268bdfa68296228d00a5ed4085f55eb143c6f97acc4b5966f000a0N.exe windows:4 windows x86 arch:x86
3c0e70bfa5f73f1f1cef484e2bcb5bf8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
user32
MessageBoxA
Sections
PELOCKnt Size: 95KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PELOCKnt Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PELOCKnt Size: 5KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 119KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PELOCKnt Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE