General
-
Target
f6a9d3e7add82c21ad66f2a0fbe8ce31330e2a284fabb69700ae5afd7188ac86
-
Size
473KB
-
Sample
250114-nqrfdsyqck
-
MD5
a2e4cfc601699cefb26f67410286dcde
-
SHA1
c9a0b105c932796c7d2c3259eadf58c4d06be514
-
SHA256
f6a9d3e7add82c21ad66f2a0fbe8ce31330e2a284fabb69700ae5afd7188ac86
-
SHA512
4ee517b0ffe411a51eeedaf22026bb38cbe5a4e4c19c8efda3bc706d105630333e42e4fe9a10ac80c8365895f7b98e22f531590b45f2f35ee0e20841116148b0
-
SSDEEP
12288:LLZ/P5ccF9lF0w6yfx+UjtOZGEn+FpNncUrOuF:vZ/R79/DTRdFrcU5
Behavioral task
behavioral1
Sample
f6a9d3e7add82c21ad66f2a0fbe8ce31330e2a284fabb69700ae5afd7188ac86.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6a9d3e7add82c21ad66f2a0fbe8ce31330e2a284fabb69700ae5afd7188ac86.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\#HowToRecover.txt
Extracted
C:\Program Files\7-Zip\#HowToRecover.txt
Targets
-
-
Target
f6a9d3e7add82c21ad66f2a0fbe8ce31330e2a284fabb69700ae5afd7188ac86
-
Size
473KB
-
MD5
a2e4cfc601699cefb26f67410286dcde
-
SHA1
c9a0b105c932796c7d2c3259eadf58c4d06be514
-
SHA256
f6a9d3e7add82c21ad66f2a0fbe8ce31330e2a284fabb69700ae5afd7188ac86
-
SHA512
4ee517b0ffe411a51eeedaf22026bb38cbe5a4e4c19c8efda3bc706d105630333e42e4fe9a10ac80c8365895f7b98e22f531590b45f2f35ee0e20841116148b0
-
SSDEEP
12288:LLZ/P5ccF9lF0w6yfx+UjtOZGEn+FpNncUrOuF:vZ/R79/DTRdFrcU5
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Disables use of System Restore points
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1