MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 364be73be12ad3e8d754ef00f5210ba22601cd5750387a44ea6cb3e2fe7b7ea7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Neshta


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: 364be73be12ad3e8d754ef00f5210ba22601cd5750387a44ea6cb3e2fe7b7ea7
SHA3-384 hash: cd88d726897ea7b25ff4db751cc8cd8b01628db0bda5fdb806550fc447553652ea89944943fdcb0708b3eb7ed0d05a8e
SHA1 hash: 598055150c5ddb564be058a3ebfa5ad643dda286
MD5 hash: 8d448b08db9940dbb1e6104aafb764b5
humanhash: fruit-bakerloo-venus-minnesota
File name:ArkAngel.exe
Download: download sample
Signature Neshta
File size:23'392'960 bytes
First seen:2022-11-04 18:57:58 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 49152:wTIIOXvsGcGOxHf+fRCWca/+TtiuUHm5n9O8aXhb0:w0NXvhDUmfRCy+pUin98h
Threatray 30 similar samples on MalwareBazaar
TLSH T19837334973D64B32FC9987714D9384E73EE6A8C65731770023D8EB963EA90C9379017A
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter Anonymous
Tags:exe Neshta

Intelligence


File Origin
# of uploads :
1
# of downloads :
204
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ArkAngel.exe
Verdict:
Malicious activity
Analysis date:
2022-11-04 18:59:53 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Moving a file to the system32 subdirectory
Creating a file in the Program Files subdirectories
Launching a process
Creating a file in the Program Files directory
Сreating synchronization primitives
Creating a file
Creating a process from a recently created file
Creating a file in the %temp% subdirectories
Sending a custom TCP request
Searching for synchronization primitives
DNS request
Creating a file in the Windows directory
Modifying an executable file
Reading critical registry keys
Creating a file in the system32 subdirectories
Searching for the window
Sending an HTTP GET request
Creating a window
Using the Windows Management Instrumentation requests
Creating a file in the system32 directory
Launching the default Windows debugger (dwwin.exe)
Setting a keyboard event handler
Unauthorized injection to a recently created process
Enabling autorun with the shell\open\command registry branches
Stealing user critical data
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Infecting executable files
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Result
Threat name:
Babadeda, Growtopia, Neshta
Detection:
malicious
Classification:
spre.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates an undocumented autostart registry key
Drops executable to a common third party application directory
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Found many strings related to Crypto-Wallets (likely being stolen)
Infects executable files (exe, dll, sys, html)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Sample is not signed and drops a device driver
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Babadeda
Yara detected Generic Downloader
Yara detected Growtopia
Yara detected Neshta
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 738345 Sample: ArkAngel.exe Startdate: 04/11/2022 Architecture: WINDOWS Score: 100 102 Malicious sample detected (through community Yara rule) 2->102 104 Antivirus detection for dropped file 2->104 106 Antivirus / Scanner detection for submitted sample 2->106 108 14 other signatures 2->108 9 ArkAngel.exe 7 2->9         started        12 svchost.com 2->12         started        14 svchost.com 2->14         started        process3 file4 72 C:\Users\user\AppData\...\Pw_External.exe, MS-DOS 9->72 dropped 74 C:\ProgramData\sex.exe, MS-DOS 9->74 dropped 76 C:\Users\user\AppData\...\ArkAngel.exe.log, ASCII 9->76 dropped 16 Pw_External.exe 8 9->16         started        19 sex.exe 7 9->19         started        22 External.exe 12->22         started        24 External.exe 14->24         started        process5 file6 58 C:\ProgramData\...xternal Loader.exe, PE32 16->58 dropped 60 C:\ProgramData\Pw Externalxternal.exe, MS-DOS 16->60 dropped 26 External.exe 16->26         started        31 External Loader.exe 16->31         started        62 C:\Users\user\AppData\Local\...\stealer.exe, PE32 19->62 dropped 64 C:\ProgramData\steal\stealeing.exe, PE32 19->64 dropped 110 Antivirus detection for dropped file 19->110 112 Machine Learning detection for dropped file 19->112 33 stealeing.exe 14 4 19->33         started        35 stealer.exe 14 24 19->35         started        signatures7 process8 dnsIp9 88 192.168.2.1 unknown unknown 26->88 78 C:\Windows\svchost.com, MS-DOS 26->78 dropped 80 C:\Users\user\AppData\Local\...\setup.exe, MS-DOS 26->80 dropped 82 C:\Users\user\AppData\Local\...xternal.exe, PE32 26->82 dropped 84 12 other malicious files 26->84 dropped 124 Creates an undocumented autostart registry key 26->124 126 Drops executable to a common third party application directory 26->126 128 Infects executable files (exe, dll, sys, html) 26->128 37 External.exe 26->37         started        90 162.159.136.232, 443, 49699 CLOUDFLARENETUS United States 31->90 100 2 other IPs or domains 31->100 130 Tries to harvest and steal browser information (history, passwords, etc) 31->130 132 Tries to steal Crypto Currency Wallets 31->132 42 WerFault.exe 31->42         started        44 WerFault.exe 31->44         started        92 162.159.128.233, 443, 49703 CLOUDFLARENETUS United States 33->92 134 Antivirus detection for dropped file 33->134 136 Multi AV Scanner detection for dropped file 33->136 138 Machine Learning detection for dropped file 33->138 46 WerFault.exe 33->46         started        94 discord.com 162.159.138.232, 443, 49694 CLOUDFLARENETUS United States 35->94 96 freegeoip.app 188.114.96.3, 443, 49698 CLOUDFLARENETUS European Union 35->96 98 ipbase.com 75.2.60.5, 443, 49700, 49712 AMAZON-02US United States 35->98 48 WerFault.exe 35->48         started        50 WerFault.exe 35->50         started        file10 signatures11 process12 dnsIp13 86 cdn.discordapp.com 162.159.130.233, 443, 49717, 49719 CLOUDFLARENETUS United States 37->86 68 C:\Windows\System32\Debugger.exe, PE32 37->68 dropped 70 C:\ProgramData\...\PixelWorldsCheater.dll, PE32+ 37->70 dropped 116 Antivirus detection for dropped file 37->116 118 Multi AV Scanner detection for dropped file 37->118 120 Machine Learning detection for dropped file 37->120 122 2 other signatures 37->122 52 svchost.com 37->52         started        56 conhost.exe 37->56         started        file14 signatures15 process16 file17 66 C:\Windows\directx.sys, ASCII 52->66 dropped 114 Sample is not signed and drops a device driver 52->114 signatures18
Gathering data
Threat name:
ByteCode-MSIL.Infostealer.Worgtop
Status:
Malicious
First seen:
2022-11-04 18:59:20 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
17 of 26 (65.38%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:blackguard family:neshta persistence spyware stealer vmprotect
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
BlackGuard
Detect Neshta payload
Modifies system executable filetype association
Neshta
Malware family:
AgentTesla.v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Neshta

Executable exe 364be73be12ad3e8d754ef00f5210ba22601cd5750387a44ea6cb3e2fe7b7ea7

(this sample)

  
Delivery method
Distributed via web download

Comments