Overview
overview
10Static
static
3NerestPC f....1.exe
windows7-x64
10NerestPC f....1.exe
windows10-2004-x64
10NerestPC f...db.dll
ubuntu-24.04-amd64
NerestPC f...pi.dll
windows7-x64
3NerestPC f...pi.dll
windows10-2004-x64
3NerestPC f...pi.dll
windows7-x64
3NerestPC f...pi.dll
windows10-2004-x64
3NerestPC f...db.exe
windows7-x64
3NerestPC f...db.exe
windows10-2004-x64
3Analysis
-
max time kernel
14s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 17:00
Static task
static1
Behavioral task
behavioral1
Sample
NerestPC free/NerestPCFree 0.31.1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
NerestPC free/NerestPCFree 0.31.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
NerestPC free/bin/Adb.dll
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral4
Sample
NerestPC free/bin/AdbWinApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
NerestPC free/bin/AdbWinApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
NerestPC free/bin/AdbWinUsbApi.dll
Resource
win7-20241010-en
Behavioral task
behavioral7
Sample
NerestPC free/bin/AdbWinUsbApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
NerestPC free/bin/adb.exe
Resource
win7-20241010-en
Behavioral task
behavioral9
Sample
NerestPC free/bin/adb.exe
Resource
win10v2004-20241007-en
General
-
Target
NerestPC free/bin/adb.exe
-
Size
5.6MB
-
MD5
f1f479bba21298e758fc22d8d98f8e48
-
SHA1
2f7ef0bf7a9ca33da621ba29794ae9c8c95c0bca
-
SHA256
705ddc21f33ac52105d1b075b019962ad0e44fb3d560bde69ce8cb3a36bca183
-
SHA512
3b491cd07e1e05e14fcec13956e8c023a4f2bbcb9459f3965868a00e33bc4d7e258ac645da9f1b5ca6f9d9a757b879d696ab95800a03240b37aa42265d4e914f
-
SSDEEP
49152:p1bbBWmqcEr5DV0uLC5sakvVgieBn5BzPZjdZYvM+ojzJLF+vW6Daa55pXxNh9Vm:hgV5mkvt6NzZYU+iWz5iXGTailRRQd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb.exe