General
-
Target
Nezur_Executor (4).zip
-
Size
18.6MB
-
Sample
241119-xdbnvavmcj
-
MD5
b464744ab9c9ebd75169f1c8639e432a
-
SHA1
ce83cff14a367c1fc88fdf1b9aa3df2e64549d85
-
SHA256
08975e2665243e02ad55dd53892d907554b297bc19ba2e4d11334eb67b45f3a6
-
SHA512
37f4cd8560b480126ca38135cdac10d28e56f36ba42583b8cfbdaf6555bc656a2448c67fc715b2337e1db07d4d87ec9336e7f7ab5418bf2bb4f9a0206817beaf
-
SSDEEP
393216:f7gYled7NfP4aahSJKqI9jE8tdBMm50uoYwQGKgyjy6KUvQPnPTpXYi:5elhAaaAUqIFuuozP1yjtvQvdR
Malware Config
Targets
-
-
Target
Nezur_Executor (4).zip
-
Size
18.6MB
-
MD5
b464744ab9c9ebd75169f1c8639e432a
-
SHA1
ce83cff14a367c1fc88fdf1b9aa3df2e64549d85
-
SHA256
08975e2665243e02ad55dd53892d907554b297bc19ba2e4d11334eb67b45f3a6
-
SHA512
37f4cd8560b480126ca38135cdac10d28e56f36ba42583b8cfbdaf6555bc656a2448c67fc715b2337e1db07d4d87ec9336e7f7ab5418bf2bb4f9a0206817beaf
-
SSDEEP
393216:f7gYled7NfP4aahSJKqI9jE8tdBMm50uoYwQGKgyjy6KUvQPnPTpXYi:5elhAaaAUqIFuuozP1yjtvQvdR
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-