General
-
Target
1545f16d88ce55983a90b16b41ab6ccbadfb90ca4c0d966b3eb6d1d2d57dabf1N.exe
-
Size
2.5MB
-
Sample
241129-mefdbazpcz
-
MD5
db0334758de1c7e8272e9dfd96e157d0
-
SHA1
365782b08a80ac7db4e7413da999f50536fe6270
-
SHA256
1545f16d88ce55983a90b16b41ab6ccbadfb90ca4c0d966b3eb6d1d2d57dabf1
-
SHA512
48996a1d57cf8548755d02be1cb5bbed4e55acd293e2094df76bf4656ea13e279559c28130714cc2f4eddd57af9d7918fea099155795d86201d1bdad7e83bc6f
-
SSDEEP
49152:0v7tA+Mr1HPPO3ojj+HSKY8X9tdLmcq/SMYB35CpciI:0DtANrJjKTttdLTM4PF
Static task
static1
Behavioral task
behavioral1
Sample
1545f16d88ce55983a90b16b41ab6ccbadfb90ca4c0d966b3eb6d1d2d57dabf1N.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
1545f16d88ce55983a90b16b41ab6ccbadfb90ca4c0d966b3eb6d1d2d57dabf1N.exe
-
Size
2.5MB
-
MD5
db0334758de1c7e8272e9dfd96e157d0
-
SHA1
365782b08a80ac7db4e7413da999f50536fe6270
-
SHA256
1545f16d88ce55983a90b16b41ab6ccbadfb90ca4c0d966b3eb6d1d2d57dabf1
-
SHA512
48996a1d57cf8548755d02be1cb5bbed4e55acd293e2094df76bf4656ea13e279559c28130714cc2f4eddd57af9d7918fea099155795d86201d1bdad7e83bc6f
-
SSDEEP
49152:0v7tA+Mr1HPPO3ojj+HSKY8X9tdLmcq/SMYB35CpciI:0DtANrJjKTttdLTM4PF
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Change Default File Association
1Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1