General
-
Target
6653b0c18045a87c84527a48fdebac81e6c3d5b861eb8d4a4ff9c97e7fccab50N
-
Size
1.3MB
-
Sample
241025-zyhn1avcqa
-
MD5
307f4735d4da3203df52c850a87ac1d0
-
SHA1
6ab7c2466119f40f3e2fba869ca106b8a5ce3bc4
-
SHA256
6653b0c18045a87c84527a48fdebac81e6c3d5b861eb8d4a4ff9c97e7fccab50
-
SHA512
dddeab6d3190331d7eb99fa874a46b3c0696bc5dba3de3990381eff0ec13190dca4b46b934e40fc0816d3efc1c20efcc4449897406da705d22d85d2cbcf645ab
-
SSDEEP
24576:977XLQ+ZJEtzdHV+SxeI305AL5YAXUaeJrKCyPK2pupN3Xwd+rQ+MCnYg3:F7UAJGz5VbNUa7AvHwd+rQhm3
Behavioral task
behavioral1
Sample
6653b0c18045a87c84527a48fdebac81e6c3d5b861eb8d4a4ff9c97e7fccab50N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
6653b0c18045a87c84527a48fdebac81e6c3d5b861eb8d4a4ff9c97e7fccab50N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6653b0c18045a87c84527a48fdebac81e6c3d5b861eb8d4a4ff9c97e7fccab50N
-
Size
1.3MB
-
MD5
307f4735d4da3203df52c850a87ac1d0
-
SHA1
6ab7c2466119f40f3e2fba869ca106b8a5ce3bc4
-
SHA256
6653b0c18045a87c84527a48fdebac81e6c3d5b861eb8d4a4ff9c97e7fccab50
-
SHA512
dddeab6d3190331d7eb99fa874a46b3c0696bc5dba3de3990381eff0ec13190dca4b46b934e40fc0816d3efc1c20efcc4449897406da705d22d85d2cbcf645ab
-
SSDEEP
24576:977XLQ+ZJEtzdHV+SxeI305AL5YAXUaeJrKCyPK2pupN3Xwd+rQ+MCnYg3:F7UAJGz5VbNUa7AvHwd+rQhm3
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Image File Execution Options Injection
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1