Overview
overview
10Static
static
10nezurr.exe
windows7-x64
7nezurr.exe
windows10-2004-x64
8nezurr.exe
android-9-x86
nezurr.exe
android-10-x64
nezurr.exe
android-11-x64
nezurr.exe
macos-10.15-amd64
8nezurr.exe
ubuntu-18.04-amd64
nezurr.exe
debian-9-armhf
nezurr.exe
debian-9-mips
nezurr.exe
debian-9-mipsel
Resubmissions
30-11-2024 13:33
241130-qtt2ssvnht 1030-11-2024 12:40
241130-pwfrhsykgj 1030-11-2024 01:05
241130-bfj74svnf1 1030-11-2024 01:04
241130-bfebvszlbl 1029-11-2024 02:23
241129-cvhs9svpep 1028-11-2024 20:40
241128-zftnjsvqer 1028-11-2024 15:00
241128-sdtgfa1let 1028-11-2024 02:05
241128-chyzqawqbm 1028-11-2024 00:14
241128-ajcf1asraj 1027-11-2024 23:38
241127-3m3rks1rcr 10General
-
Target
nezurr.exe
-
Size
7.5MB
-
Sample
241121-2nmajstkak
-
MD5
92c47cbd15a6099a4da50d726015508c
-
SHA1
91e8ab7d6c699f8ed8247705d03cec2c3d9b97d8
-
SHA256
f4d4286a5b93621dac280247aa449c39a018aa4295e6f2c6a8dc80dfcfa64bf7
-
SHA512
00f7b1ff896e034108c4e66812605dbbcf3eaef712823a561ffc642282b45a5838bf706e449b42381f794ccb0aa74e41fcc72ecfe28b5e37e31fff24800e3946
-
SSDEEP
196608:qWgeIvwfI9jUC2gYBYv3vbWvGPI63p1e5zf:CaIH2gYBgDWgpwVf
Behavioral task
behavioral1
Sample
nezurr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
nezurr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
nezurr.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
nezurr.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
nezurr.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
nezurr.exe
Resource
macos-20241106-en
Behavioral task
behavioral7
Sample
nezurr.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
nezurr.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
nezurr.exe
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral10
Sample
nezurr.exe
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
nezurr.exe
-
Size
7.5MB
-
MD5
92c47cbd15a6099a4da50d726015508c
-
SHA1
91e8ab7d6c699f8ed8247705d03cec2c3d9b97d8
-
SHA256
f4d4286a5b93621dac280247aa449c39a018aa4295e6f2c6a8dc80dfcfa64bf7
-
SHA512
00f7b1ff896e034108c4e66812605dbbcf3eaef712823a561ffc642282b45a5838bf706e449b42381f794ccb0aa74e41fcc72ecfe28b5e37e31fff24800e3946
-
SSDEEP
196608:qWgeIvwfI9jUC2gYBYv3vbWvGPI63p1e5zf:CaIH2gYBgDWgpwVf
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Hide Artifacts
3Hidden Files and Directories
2Resource Forking
1Indicator Removal
1File Deletion
1Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Gatekeeper Bypass
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3