General
-
Target
36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe
-
Size
541KB
-
Sample
241219-a823yszqhk
-
MD5
6b906d57676cc916d404cc88fef0c590
-
SHA1
e368ca486debf6f912924dfc11df3b64983e1b2b
-
SHA256
36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6
-
SHA512
4655ff302552ae86f9fb0c9c7db9f454a522fcf8c004224db7ea58da5e9ff58770c934a5399645887a78a2d068baa6c516b172c37190c5304a7beebe918fbad2
-
SSDEEP
6144:k9BmAQIPvTmaEVmP02yCUE+cw0wIceA4D55qv4t/uBmohChYgXP6RIeLWKiBlwq:9AQIXqaE0yCgqwXeAVmoEAlLViBlwq
Behavioral task
behavioral1
Sample
36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6N.exe
-
Size
541KB
-
MD5
6b906d57676cc916d404cc88fef0c590
-
SHA1
e368ca486debf6f912924dfc11df3b64983e1b2b
-
SHA256
36f47ab62314df3e626443e437cbb14d2d6238d16d51c4ea532c85746dbd5ae6
-
SHA512
4655ff302552ae86f9fb0c9c7db9f454a522fcf8c004224db7ea58da5e9ff58770c934a5399645887a78a2d068baa6c516b172c37190c5304a7beebe918fbad2
-
SSDEEP
6144:k9BmAQIPvTmaEVmP02yCUE+cw0wIceA4D55qv4t/uBmohChYgXP6RIeLWKiBlwq:9AQIXqaE0yCgqwXeAVmoEAlLViBlwq
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1