General
-
Target
0b6f3a6613bbb7e032733a2bc387e05d7b9fe0221b50d5badfa702e42ef6217aN
-
Size
5.0MB
-
Sample
240929-r69tfsycnn
-
MD5
bc02a7ee0aaf6ff2ca372ca97b6619c0
-
SHA1
b93e6b6542498a0a59442705b34c70677b7c1fe9
-
SHA256
0b6f3a6613bbb7e032733a2bc387e05d7b9fe0221b50d5badfa702e42ef6217a
-
SHA512
9ee942e7480b9ce9dd5c62d830073f46b29857ffd41e88e49febe347eb9556ca0d832a3edbbde51e586096a4d803900b48b45ab5173b57988c22db46f8f52465
-
SSDEEP
98304:mV46ubY4Mt9Jy00wLWfVU06WWNqiJTFnNabprJJanNC7Me1AxMQssUKTm/EMPePD:E2MDJydB8WYtznNabpan0GqsUKmEMPT4
Behavioral task
behavioral1
Sample
0b6f3a6613bbb7e032733a2bc387e05d7b9fe0221b50d5badfa702e42ef6217aN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
0b6f3a6613bbb7e032733a2bc387e05d7b9fe0221b50d5badfa702e42ef6217aN
-
Size
5.0MB
-
MD5
bc02a7ee0aaf6ff2ca372ca97b6619c0
-
SHA1
b93e6b6542498a0a59442705b34c70677b7c1fe9
-
SHA256
0b6f3a6613bbb7e032733a2bc387e05d7b9fe0221b50d5badfa702e42ef6217a
-
SHA512
9ee942e7480b9ce9dd5c62d830073f46b29857ffd41e88e49febe347eb9556ca0d832a3edbbde51e586096a4d803900b48b45ab5173b57988c22db46f8f52465
-
SSDEEP
98304:mV46ubY4Mt9Jy00wLWfVU06WWNqiJTFnNabprJJanNC7Me1AxMQssUKTm/EMPePD:E2MDJydB8WYtznNabpan0GqsUKmEMPT4
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1