General
-
Target
NL Brute.exe
-
Size
7.8MB
-
Sample
241108-fme9ysvpes
-
MD5
aa7a175b442aa64c84fb306979a4320b
-
SHA1
a7cd106acbc7675337977f55387b92145190eb1c
-
SHA256
b3c4140104b09723a786c120c921b9e46d7b50be5fb0bd4afa7bbb23069948de
-
SHA512
bab9d021d7d1efb24298cb66f29d1d2b716a8ea24e44891cc01a1a3249cf32bfdf1688cac70e33f336c2e70b967ae3e22f3855c9dafdeb2d1f67e6e98adb4295
-
SSDEEP
196608:CfP0p8Y4DFbBJ5dIa82Vou2j09a3XAydVdODHMD16UAsdf6:CO8YwFV/dIa8wp2j09qXAyYDHMDYrsdi
Behavioral task
behavioral1
Sample
NL Brute.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
NL Brute.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
NL Brute.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
NL Brute.exe
-
Size
7.8MB
-
MD5
aa7a175b442aa64c84fb306979a4320b
-
SHA1
a7cd106acbc7675337977f55387b92145190eb1c
-
SHA256
b3c4140104b09723a786c120c921b9e46d7b50be5fb0bd4afa7bbb23069948de
-
SHA512
bab9d021d7d1efb24298cb66f29d1d2b716a8ea24e44891cc01a1a3249cf32bfdf1688cac70e33f336c2e70b967ae3e22f3855c9dafdeb2d1f67e6e98adb4295
-
SSDEEP
196608:CfP0p8Y4DFbBJ5dIa82Vou2j09a3XAydVdODHMD16UAsdf6:CO8YwFV/dIa8wp2j09qXAyYDHMDYrsdi
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1