MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ec2ec99d719ccde3972abb4db0ef83eae6462f4697861529ead23d304c527d29. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Neshta
Vendor detections: 16
| SHA256 hash: | ec2ec99d719ccde3972abb4db0ef83eae6462f4697861529ead23d304c527d29 |
|---|---|
| SHA3-384 hash: | 99666709800d31b47e6f164034440f996f85d75303c796b0c47b937f0a24780e269526fc9d349bedceeb2b90f3db2bbf |
| SHA1 hash: | 655c06920e5f737b0a83018acbab4235b9933733 |
| MD5 hash: | 63e601878d77aeba4ba671307f870285 |
| humanhash: | golf-louisiana-two-magazine |
| File name: | 63e601878d77aeba4ba671307f870285 |
| Download: | download sample |
| Signature | Neshta |
| File size: | 359'424 bytes |
| First seen: | 2023-12-12 03:49:44 UTC |
| Last seen: | 2024-01-13 00:59:28 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d7401947d3623a2199a2114d62923cd5 (2 x Neshta, 2 x XWorm, 1 x Sality) |
| ssdeep | 6144:jyH7xOc6H5c6HcT66vlmr641MkjVxvb1UeRUqptyH7xOc6H5c6HcT66vlmr3UeRw:jaPkPOezaXe/aXek |
| Threatray | 77 similar samples on MalwareBazaar |
| TLSH | T1A7749D2526D08D3DE87F2AF715F81B53C77BECB17904D04E4BE0699A26322D0D96872B |
| TrID | 63.7% (.EXE) MinGW32 C/C++ Executable (245239/59/22) 10.8% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9) 8.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 4.2% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.4% (.SCR) Windows screen saver (13097/50/3) |
| Reporter | |
| Tags: | 32 exe Neshta |
Intelligence
File Origin
FRVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
cb15585aac621fef5710d7c2b6cc714d7d3283576717cd7738a0898d5b63a470
4dcd84003dc7b4d627193ce18034c71a3ee35980495d755d9bcf80a672eb544e
2e5b9ebfb2b81c5e512248e2e9224d1054defc4b027c0108fc10d268312ce290
68652defc71770065997b7d60a64a3959446a114a2ee17a443a15ae8b767f150
640315d3ee04d383d4b8702b0d29a11846139cb9505078440f2e67b2d9bc3cce
4608c3c211744ce283dac6c36cb7a2c0fd584ee440fa4f671bc270f1bc737ff0
c8bb8271adc398661a408fc99b14a7d3797bd546b0b836f68a059c2f72948937
cd23680ab97a8fa8c459690061e90ea0d48d19975900f1a0ee41ffcd76bbb311
313cabf464e7edf69744f94c3ea234fbb5d7b99daf2aff5492131a4ca9d08e00
60292e6be9d0d5e5f82a3382e4b69fcd19362b4c30a1829787dfc6ea5462a117
ec2ec99d719ccde3972abb4db0ef83eae6462f4697861529ead23d304c527d29
a8df709495ab9ea938880b1ebe744b33bc163b2fe576ce7e585caef7c846b718
a6077288d1353daaab0bf9092c357cd7f0712537def3ff3be60fa68da4e436ac
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | APT_ArtraDownloader2_Aug19_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects ArtraDownloader malware |
| Reference: | https://unit42.paloaltonetworks.com/multiple-artradownloader-variants-used-by-bitter-to-target-pakistan/ |
| Rule name: | DevCv4 |
|---|---|
| Author: | malware-lu |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | maldoc_getEIP_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | MALWARE_Win_Neshta |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Neshta |
| Rule name: | MAL_ArtraDownloader2_Aug19_1_RID30FB |
|---|---|
| Author: | Florian Roth |
| Description: | Detects ArtraDownloader malware |
| Reference: | https://unit42.paloaltonetworks.com/multiple-artradownloader-variants-used-by-bitter-to-target-pakistan/ |
| Rule name: | MAL_Neshta_Generic |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Neshta malware |
| Reference: | Internal Research |
| Rule name: | MAL_Neshta_Generic_RID2DC9 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Neshta malware |
| Reference: | Internal Research |
| Rule name: | meth_get_eip |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | Njrat |
|---|---|
| Author: | botherder https://github.com/botherder |
| Description: | Njrat |
| Rule name: | VideoLanClient |
|---|---|
| Author: | malware-lu |
| Rule name: | W32JeefoPEFileInfector |
|---|---|
| Author: | malware-lu |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://cms-sh.de/1/stub.exe