Resubmissions
30-11-2024 13:33
241130-qtt2ssvnht 1030-11-2024 12:40
241130-pwfrhsykgj 1030-11-2024 01:05
241130-bfj74svnf1 1030-11-2024 01:04
241130-bfebvszlbl 1029-11-2024 02:23
241129-cvhs9svpep 1028-11-2024 20:40
241128-zftnjsvqer 1028-11-2024 15:00
241128-sdtgfa1let 1028-11-2024 02:05
241128-chyzqawqbm 1028-11-2024 00:14
241128-ajcf1asraj 1027-11-2024 23:38
241127-3m3rks1rcr 10General
-
Target
nezurr.exe
-
Size
7.5MB
-
Sample
241130-bfj74svnf1
-
MD5
92c47cbd15a6099a4da50d726015508c
-
SHA1
91e8ab7d6c699f8ed8247705d03cec2c3d9b97d8
-
SHA256
f4d4286a5b93621dac280247aa449c39a018aa4295e6f2c6a8dc80dfcfa64bf7
-
SHA512
00f7b1ff896e034108c4e66812605dbbcf3eaef712823a561ffc642282b45a5838bf706e449b42381f794ccb0aa74e41fcc72ecfe28b5e37e31fff24800e3946
-
SSDEEP
196608:qWgeIvwfI9jUC2gYBYv3vbWvGPI63p1e5zf:CaIH2gYBgDWgpwVf
Behavioral task
behavioral1
Sample
nezurr.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
nezurr.exe
-
Size
7.5MB
-
MD5
92c47cbd15a6099a4da50d726015508c
-
SHA1
91e8ab7d6c699f8ed8247705d03cec2c3d9b97d8
-
SHA256
f4d4286a5b93621dac280247aa449c39a018aa4295e6f2c6a8dc80dfcfa64bf7
-
SHA512
00f7b1ff896e034108c4e66812605dbbcf3eaef712823a561ffc642282b45a5838bf706e449b42381f794ccb0aa74e41fcc72ecfe28b5e37e31fff24800e3946
-
SSDEEP
196608:qWgeIvwfI9jUC2gYBYv3vbWvGPI63p1e5zf:CaIH2gYBgDWgpwVf
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3