General
-
Target
svchost.exe
-
Size
112KB
-
Sample
250113-l17h9azqdq
-
MD5
2f000e0a52d6ee0c89f93fa5ab4c7e3c
-
SHA1
6e45db2cc4648a388fbd6f3d82c7da9c8e30187d
-
SHA256
cf1ebd6fb534d65dd0e8164db9693988d5a4a645dd044beba578ab25c0033e66
-
SHA512
d433bf1fa375511d86621154450ade0879ee2705e7117fe6be67e38a26294d4187663b47ba3119da1776bf0594d516833696b80a502ff87b92c115cf98a368c4
-
SSDEEP
1536:JxqjQ+P04wsmJCyfWxMb+KR0Nc8QsJq3+kk8YM7U1BEwox+L2CG7o:sr85CyOxe0Nc8QsC+kfYhHV2CZ
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_http
http://185.174.100.204:443/L7RZw57VJ-b1dfR0k_tCyQtB1fJI8WowHQJSk54rTfUI2od24XrEIUzV5WGzx5fD0nPOwbVMrUfjFtDSZ8s8FudwarDyt7dL8gMPumRtXRv_ondaA99DiB1AmQDhTROOEB5RNqoBUGF7RO1eVLkzN4bgXoa9mjeqRlP1HJkpzxwa-XWfCySg54DfgGxSZPQAlpmdrTQwiPTmXmZzxGfhQBf
Extracted
metasploit
encoder/shikata_ga_nai
Targets
-
-
Target
svchost.exe
-
Size
112KB
-
MD5
2f000e0a52d6ee0c89f93fa5ab4c7e3c
-
SHA1
6e45db2cc4648a388fbd6f3d82c7da9c8e30187d
-
SHA256
cf1ebd6fb534d65dd0e8164db9693988d5a4a645dd044beba578ab25c0033e66
-
SHA512
d433bf1fa375511d86621154450ade0879ee2705e7117fe6be67e38a26294d4187663b47ba3119da1776bf0594d516833696b80a502ff87b92c115cf98a368c4
-
SSDEEP
1536:JxqjQ+P04wsmJCyfWxMb+KR0Nc8QsJq3+kk8YM7U1BEwox+L2CG7o:sr85CyOxe0Nc8QsC+kfYhHV2CZ
-
Detect Neshta payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Modifies system executable filetype association
-