General
-
Target
d5a67b0f6ece15d02dc597e12595187a2848306269031e6e414b0455c004dc21N.exe
-
Size
1.4MB
-
Sample
250117-n8sfeaxmak
-
MD5
a482bf6cb6fe273aac13f2fdb6e95910
-
SHA1
37b56d3b1f00600552ce0983b7a852705cc5033b
-
SHA256
d5a67b0f6ece15d02dc597e12595187a2848306269031e6e414b0455c004dc21
-
SHA512
d25e6347d696d27ef731086051db8f4b81102e93d0ff1256b52877a2e34fb229a74b7149d927f4cad0f33f86ab3584bf07e2992cc78d9e6ecba9c17703a6ca69
-
SSDEEP
24576:+OU0p4qlWfBTfmRfanIT6lUScOWFohEp6Vvn6qtndPVmatCkbpmpp2b:+OJpP4JTm5T6lkFohDB6sndPVa6gsb
Behavioral task
behavioral1
Sample
d5a67b0f6ece15d02dc597e12595187a2848306269031e6e414b0455c004dc21N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d5a67b0f6ece15d02dc597e12595187a2848306269031e6e414b0455c004dc21N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d5a67b0f6ece15d02dc597e12595187a2848306269031e6e414b0455c004dc21N.exe
-
Size
1.4MB
-
MD5
a482bf6cb6fe273aac13f2fdb6e95910
-
SHA1
37b56d3b1f00600552ce0983b7a852705cc5033b
-
SHA256
d5a67b0f6ece15d02dc597e12595187a2848306269031e6e414b0455c004dc21
-
SHA512
d25e6347d696d27ef731086051db8f4b81102e93d0ff1256b52877a2e34fb229a74b7149d927f4cad0f33f86ab3584bf07e2992cc78d9e6ecba9c17703a6ca69
-
SSDEEP
24576:+OU0p4qlWfBTfmRfanIT6lUScOWFohEp6Vvn6qtndPVmatCkbpmpp2b:+OJpP4JTm5T6lkFohDB6sndPVa6gsb
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Indicator Removal
1Clear Persistence
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1