Overview
overview
10Static
static
10Method/Met...in.exe
windows7-x64
10Method/Met...in.exe
windows10-2004-x64
10Method/Met...in.exe
windows7-x64
10Method/Met...in.exe
windows10-2004-x64
10Method/Met....3.exe
windows7-x64
7Method/Met....3.exe
windows10-2004-x64
8Method/Met...UI.exe
windows7-x64
1Method/Met...UI.exe
windows10-2004-x64
6Method/Met...UI.exe
windows7-x64
10Method/Met...UI.exe
windows10-2004-x64
10Method/Met...te.exe
windows7-x64
10Method/Met...te.exe
windows10-2004-x64
10Method/Met...ain.py
windows7-x64
3Method/Met...ain.py
windows10-2004-x64
3Method/Met...rt.bat
windows7-x64
3Method/Met...rt.bat
windows10-2004-x64
3Method/Met...47.dll
windows7-x64
1Method/Met...47.dll
windows10-2004-x64
1Method/Met...on.dll
windows7-x64
1Method/Met...on.dll
windows10-2004-x64
1Method/Met...if.dll
windows7-x64
1Method/Met...if.dll
windows10-2004-x64
1Method/Met...ns.dll
windows7-x64
1Method/Met...ns.dll
windows10-2004-x64
1Method/Met...co.dll
windows7-x64
1Method/Met...co.dll
windows10-2004-x64
1Method/Met...eg.dll
windows7-x64
1Method/Met...eg.dll
windows10-2004-x64
1Method/Met...vg.dll
windows7-x64
1Method/Met...vg.dll
windows10-2004-x64
1Method/Met...ga.dll
windows7-x64
1Method/Met...ga.dll
windows10-2004-x64
1General
-
Target
Method.zip
-
Size
355.2MB
-
Sample
241201-wph2maxpax
-
MD5
eaa98fb919ce0219a425694e0b03839e
-
SHA1
0d8d21e988499e292e78675be4f614f02477fd44
-
SHA256
1dc4ecb493c5e6319426306929fe0e667c7c5de0326ef29893c7cbb54ee3a370
-
SHA512
c6c738f75da514a8958fbc5dd495201791b127cc0fac8a9284c90e59cbf38e51b9675c8be7831c984a1adb8ee95b3c5d58c4ca82816ecf7ea97839accac475ce
-
SSDEEP
6291456:hmjabyvpN+HoKjNgafxL94k31af5kQuM5kdWbRz0uSsbegLMfkF+Fi2bAV:4Foz2afxuk3CkdWb15brMfkF+zAV
Behavioral task
behavioral1
Sample
Method/Method/2. Parameters/Tool/1. Parameter Hq/main.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Method/Method/2. Parameters/Tool/1. Parameter Hq/main.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Method/Method/2. Parameters/Tool/2. Clean/main.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Method/Method/2. Parameters/Tool/2. Clean/main.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Method/Method/MailDumper v1.2.3.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Method/Method/MailDumper v1.2.3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Method/Method/Tool/Mango/MangoKeywordsGUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Method/Method/Tool/Mango/MangoKeywordsGUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Method/Method/Tool/Mango/MangoKeywordsTUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Method/Method/Tool/Mango/MangoKeywordsTUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Method/Method/Tool/SAS/SwissArmySuite.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Method/Method/Tool/SAS/SwissArmySuite.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Method/Method/Tool/Switcher/main.py
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Method/Method/Tool/Switcher/main.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Method/Method/Tool/Switcher/start.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Method/Method/Tool/Switcher/start.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Method/Method/Tool/Xdg/D3Dcompiler_47.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Method/Method/Tool/Xdg/D3Dcompiler_47.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Method/Method/Tool/Xdg/iconengines/qsvgicon.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Method/Method/Tool/Xdg/iconengines/qsvgicon.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Method/Method/Tool/Xdg/imageformats/qgif.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Method/Method/Tool/Xdg/imageformats/qgif.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Method/Method/Tool/Xdg/imageformats/qicns.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Method/Method/Tool/Xdg/imageformats/qicns.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Method/Method/Tool/Xdg/imageformats/qico.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
Method/Method/Tool/Xdg/imageformats/qico.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Method/Method/Tool/Xdg/imageformats/qjpeg.dll
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Method/Method/Tool/Xdg/imageformats/qjpeg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Method/Method/Tool/Xdg/imageformats/qsvg.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Method/Method/Tool/Xdg/imageformats/qsvg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Method/Method/Tool/Xdg/imageformats/qtga.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Method/Method/Tool/Xdg/imageformats/qtga.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Method/Method/2. Parameters/Tool/1. Parameter Hq/main.exe
-
Size
6.9MB
-
MD5
103094611fd5964a753bded872de235e
-
SHA1
bc0a0f5b1e975795aa893ee6f0c61927e20389ea
-
SHA256
3814314e3ac6b9d6854a1e18895cfb30d19dc9dbf9455869624c4182ae9b494f
-
SHA512
5cdb5b5c110621ab06102094bace1fa260e574cede38129bc64232e77593426e6f0e7abe365461189203d8e6f5867756d61283455414ccfcae8cd47b371fef69
-
SSDEEP
196608:0sfXWA1HeT39IigFeE9TFa0Z8DOjCdyluomnzbQW7txK:F1+TtIiRY9Z8D8Ccl5KnPxK
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
-
-
Target
Method/Method/2. Parameters/Tool/2. Clean/main.exe
-
Size
6.9MB
-
MD5
98248e7ee72e4768f5c96dc069d02c1b
-
SHA1
cdcea49f4b97f58649abd40bc8db913db5e78483
-
SHA256
39e1357bea6cb75722748ecd83524003233b102718f011371841ea7f775abf7f
-
SHA512
09ef54f66eb8a8f8d442245bf562d36e4e3382d2fc1f4213c71c7ff53bb0fd4485a255c5188866a0d6ff2362bb45359db14dac7a4c7d2b769afa1d139c743348
-
SSDEEP
196608:0sU2WA1HeT39IigFeE9TFa0Z8DOjCdyluomnzbQW7txB:J1+TtIiRY9Z8D8Ccl5KnPxB
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
-
-
Target
Method/Method/MailDumper v1.2.3.exe
-
Size
14.0MB
-
MD5
203069c34e0ca0aa5f9989f017183c7d
-
SHA1
56c8d23005e226fade5bb89e65fcb6cb54f61d55
-
SHA256
0bc9a0422c1cd4b679b5d827340d902e10916c8612c202ba899faa8becd94fc8
-
SHA512
f6752eea901b1d45a3595fafc1fd246ae976ee3cf2b4a290c290afd60a5ae02f6092374dcf292710139987beec68d70fb9bf531be262657bc5088da8d19ed5b8
-
SSDEEP
393216:bSatY8L2Vmd6melh2pOc/e+7G99YPzAr5jEGuKsV:bSai8yVmdKQpOunzseG6
-
Modifies Windows Firewall
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Method/Method/Tool/Mango/MangoKeywordsGUI.exe
-
Size
15.3MB
-
MD5
231fa08d0028c22d60bf518bf2e3615b
-
SHA1
7e0fd503bf320319b9c527c823fdcf5e5d2eef4d
-
SHA256
07391a3d0e3cd43bf1fce74cc5dc29d95f0774d294abbc63fd8dcd281cecf105
-
SHA512
593307fa18b04bcd3c673537ea862e9d123550710937b461b620642eb371b67fb0b43bac44930c16ba53b4daa79a0f2b3a07fbe9b22c2811a5934ac2aa502d1e
-
SSDEEP
98304:xjYwG3AAkPyKDgDVtwxjt8B203CFI19SswqTdVi72XMVQmppPF32aO3QdM3HwAec:xO3PksSUVMVGaOASw/rSka
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
Method/Method/Tool/Mango/MangoKeywordsTUI.exe
-
Size
7.8MB
-
MD5
b06b62fec1ff51c8cdbd9fef72d47cbb
-
SHA1
f375179cafecc62e0d1161311bd007792a75a75b
-
SHA256
6c4ae70ec6989012cc3a34c5f5747825917a7164eb38f6daaec3312518df2391
-
SHA512
77b6af720e8857a49c78269ce55b5072b24531f2768505a24fa46a8bff0342c2a5c3b1a2be283d61184159af3d8e30af7cdf941d9a2a898d4c15eb696d757e82
-
SSDEEP
98304:X5VYVCHZrtBwwRFqgdExOlYuI0p56Af7ryf:X5VYVAJFvc9ief
Score10/10-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
-
-
Target
Method/Method/Tool/SAS/SwissArmySuite.exe
-
Size
8.2MB
-
MD5
9b4eaa20d65e945faf09a32e8749b565
-
SHA1
477df82f9f38d74b5c48a1ff4783b138fd8271d1
-
SHA256
8fe62d8f4512ee5a8c959aa5f4cc77e3d71c9259e259431523480462c0e68386
-
SHA512
831de42440f63d5022f180f58b53399013323249845175dd21c0ba17e2dccb610c8d6e9ab576c5e59f831dadefb676a13786c4519e25ce92abf7f7d10aec40aa
-
SSDEEP
98304:iHLtt8dlKNOM9+0BRvEpSW821Zb0MvwR0mV93P9max5QOsw:i197LW8gNwR0KtwaYNw
Score10/10-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
-
-
Target
Method/Method/Tool/Switcher/main.py
-
Size
2KB
-
MD5
5da65f42a661539cf6c7b813bacf6b3c
-
SHA1
3f52e9474f045d9f0a05d75c3f1ff1ef2774ac1f
-
SHA256
093ae1ee4d93b0d31a7caf7f68da5de8dfad103a6ecef6f63d98f37d3f4b9d35
-
SHA512
1f832c8134e438d3ff506e8524e09365248dcdefc75eb8a70748e41d034800ba4295b3231978b3bb43c573ec72be0b4aaef6ee4293fe5cbabb75d77a34d67a9f
Score3/10 -
-
-
Target
Method/Method/Tool/Switcher/start.bat
-
Size
7B
-
MD5
5bc02cefb3ea9e27f1a6776eabd1935d
-
SHA1
f1bdda93d9a278e358509d498e17d97764c1fb29
-
SHA256
b10564ab7d2c520cdd0243874879fb0a782862c3c902ab535faabe57d5a505e1
-
SHA512
f36427d6c7c2e983bea98d274f0bbab92b75f0974f3304461d5e582be348ea70a4b9f33ebfedddc5259aecf1589269f14676138e0ae49cb9f213730938db8c1d
Score3/10 -
-
-
Target
Method/Method/Tool/Xdg/D3Dcompiler_47.dll
-
Size
4.0MB
-
MD5
b0ae3aa9dd1ebd60bdf51cb94834cd04
-
SHA1
ee2f5726ac140fb42d17aba033d678afaf8c39c1
-
SHA256
e994847e01a6f1e4cbdc5a864616ac262f67ee4f14db194984661a8d927ab7f4
-
SHA512
756ebf4fa49029d4343d1bdb86ea71b2d49e20ada6370fd7582515455635c73d37ad0dbdeef456a10ab353a12412ba827ca4d70080743c86c3b42fa0a3152aa3
-
SSDEEP
49152:8BfmqCtLI4erBYysLjG/A8McPyCD6hw16JVTW7B3EgvVlQ3LAYmyNOvGJse+aWyb:8eZevVKACOvWYQF
Score1/10 -
-
-
Target
Method/Method/Tool/Xdg/iconengines/qsvgicon.dll
-
Size
45KB
-
MD5
ab6fd39be93f7554db273cde12f91bac
-
SHA1
765200feedca6991cf2c4aba9ee924bacb9116be
-
SHA256
ff02d120f090be3d33326a663a8c21bd9d178207e15367614e822ba147721dca
-
SHA512
5525f7efa1840cd3897f4148f8551d176e8a4a7a3eed4a17230a3f3ffc637c703dfac9bd8fc25273e92bf16f8948d8173814bb64e9fb41d24fe49269ebc1d489
-
SSDEEP
768:sv4XCkdyOhDiosXTNHqmtbzZ4YmQAmYmKqmQ35DXzi4lmzGK:sAp1ET9LAm4Q5i4AN
Score1/10 -
-
-
Target
Method/Method/Tool/Xdg/imageformats/qgif.dll
-
Size
39KB
-
MD5
b11749f8761858a81641fce3170d5aaf
-
SHA1
135655fe8fdb92e7687edeac9672d811f17f9cad
-
SHA256
52832ac7edc720202373b3b7811ffad571ea732bbfaa7cc0249a61be795cc1d9
-
SHA512
dee07b86429ac4b19be7b906101b0ccac95ae4c912c884d4922b3b9cada6a2542eb84cd67a71256e756ec38edad0723af55c6e5c4d0cec4dcb1952e5b8835f1d
-
SSDEEP
768:ZOPWL1Ah3opxwllyL93LfmBqwCblpvJQQiRkhALmzf:ZOO1Ah3oj3qBGblXQQiOhAyT
Score1/10 -
-
-
Target
Method/Method/Tool/Xdg/imageformats/qicns.dll
-
Size
48KB
-
MD5
58e3b20e2bcc92d8927aa7e3cd206aa9
-
SHA1
fb5ad84877d215f43af9bfeb14e1d815f5f99755
-
SHA256
f2daa31679e4ae74899f51bf352125467b564f95c18fce25f07ae76298a6859a
-
SHA512
9c5830748dd8c4104063d939257498a11648efd1e57ebe8d9d593852d1fea85eee7c2b1252dc9404b14a0aff0b3745d42df914bfd8baca5661a4519d9c39c867
-
SSDEEP
768:fUufTa3SGf76X9+PsxyxEv0XYOzSJYRbKjOQvcRmWmzqo:fU467jgxv8XYOmJMQvcRmzf
Score1/10 -
-
-
Target
Method/Method/Tool/Xdg/imageformats/qico.dll
-
Size
38KB
-
MD5
8330a318b2747156dab176c3de15121a
-
SHA1
2c478d94339f7b852f19b64ff768c5bd2c9bab60
-
SHA256
cbf94011b5309676accd4e498e9bf580639af62b4c35309bb0c3aed8951ca90c
-
SHA512
39a2fa386762fb6f0356da7f262ad21774ab4cba0525b70e1be971d042b7593a4ef623eca3868722c8b1e123d1fcdeefd84cff6762dd01befef1fb647a869d28
-
SSDEEP
768:AsLbQ2DUvSAsAqwodfPr5uaeEcQO4QKjEskmzZ:AsLbQ2DUqAstweNpe6QKgsll
Score1/10 -
-
-
Target
Method/Method/Tool/Xdg/imageformats/qjpeg.dll
-
Size
383KB
-
MD5
060cfe4c4956a885094a038ab9cc6225
-
SHA1
c2178ed5255430b313d5a1564148b0d8548a9fe3
-
SHA256
6a6b7a4960be86d48c446f4066ba5cc9d9b9a2d75cba88883f48a91a63e760c7
-
SHA512
bf7b234d4c892ff722c7ea8c12079f60daab41206b4c646d28e76b94e708ea66407d87a28cfd53cd2929c166e9de557d0b5a65b1b0d5bcca4b2c06008ef6435d
-
SSDEEP
6144:Ek1zBFfz/N6MLARlZU/fU32LPjgx1ZVwSLlQI:Ek1zBFgM3rS+m
Score1/10 -
-
-
Target
Method/Method/Tool/Xdg/imageformats/qsvg.dll
-
Size
32KB
-
MD5
21a3f5eba98004a67d113e4d6c480245
-
SHA1
e59aedd5f11352137b4da18b51166d537e4a95e6
-
SHA256
f94f1fd1c6b6e17cd9968469aea37823a1143a8d995e268f95ba529c5b6a0231
-
SHA512
c57f5c7dd11205dbb7cc90db8a089aa8921ff65ba565d75632d768b682387770e64e411c7190cb75f18ee60576fb53912da9f59cca9a44bae953e6634d654762
-
SSDEEP
768:60SNI4RG7aUSqDhNIghidZn/jlil2QNTtPTDmz6/:yNIIUSonhw22QNTtPTqO/
Score1/10 -
-
-
Target
Method/Method/Tool/Xdg/imageformats/qtga.dll
-
Size
30KB
-
MD5
4f2fe41c08e3e68c56c04c608079c1dd
-
SHA1
6f7e0536df401c47e6dfaf61e32b5e5872c818dc
-
SHA256
ef870460ceb2bf299f324f9878bf9cc2438fdf0ef3e62e5d4f065a44b3991d2c
-
SHA512
66e2b1d32e02ecf2d3c63f2f9222467d1ca4635de4ef776e1a8a32a7c583d26f5a7986c3111cc1595334017fa1431765817a4459d6423513fe8f35a379d7dc5a
-
SSDEEP
384:pTOZ54a4le/hEO03PyjgJrPR7btHaZpXlnrIYQbYc+GrH5nfePPLTTjJf:YZqarNi6kpnYVn1Q3xrZmzt
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Authentication Process
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3