General

  • Target

    Nezur_Executor (4).zip

  • Size

    18.6MB

  • Sample

    241119-xdbnvavmcj

  • MD5

    b464744ab9c9ebd75169f1c8639e432a

  • SHA1

    ce83cff14a367c1fc88fdf1b9aa3df2e64549d85

  • SHA256

    08975e2665243e02ad55dd53892d907554b297bc19ba2e4d11334eb67b45f3a6

  • SHA512

    37f4cd8560b480126ca38135cdac10d28e56f36ba42583b8cfbdaf6555bc656a2448c67fc715b2337e1db07d4d87ec9336e7f7ab5418bf2bb4f9a0206817beaf

  • SSDEEP

    393216:f7gYled7NfP4aahSJKqI9jE8tdBMm50uoYwQGKgyjy6KUvQPnPTpXYi:5elhAaaAUqIFuuozP1yjtvQvdR

Malware Config

Targets

    • Target

      Nezur_Executor (4).zip

    • Size

      18.6MB

    • MD5

      b464744ab9c9ebd75169f1c8639e432a

    • SHA1

      ce83cff14a367c1fc88fdf1b9aa3df2e64549d85

    • SHA256

      08975e2665243e02ad55dd53892d907554b297bc19ba2e4d11334eb67b45f3a6

    • SHA512

      37f4cd8560b480126ca38135cdac10d28e56f36ba42583b8cfbdaf6555bc656a2448c67fc715b2337e1db07d4d87ec9336e7f7ab5418bf2bb4f9a0206817beaf

    • SSDEEP

      393216:f7gYled7NfP4aahSJKqI9jE8tdBMm50uoYwQGKgyjy6KUvQPnPTpXYi:5elhAaaAUqIFuuozP1yjtvQvdR

    Score
    8/10
    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: [email protected]

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks