General

  • Target

    NerestPc.exe

  • Size

    2.8MB

  • Sample

    240222-tds2cace49

  • MD5

    9db30dedeed5a5d3b7bee80b5bdbbc46

  • SHA1

    7cf71e9c9b433d269050011f9e76e70f083282d6

  • SHA256

    047f4f423ccd4d20d1f4f4fa9d2c4e03641b00ace5929c86327974945bb0648a

  • SHA512

    f0adc2e17ebfda0d5a0157245e3912e777509e71b7c31cbf735fedbf10f6a350661a127436fc90616067b8928fb002b79585998996857aed2b82c06590a8ba02

  • SSDEEP

    49152:AtKPduNQ7ekxGFj5pU5r08ZbSR/6x1k2akRbfSafKN8q6o5pOuP6kv21BN4CArY:AtKlum7l4pU28SR/OTRbf+8q38uSEuBd

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %Temp%

  • install_file

    wininit.exe

  • pastebin_url

    https://pastebin.com/raw/7MyeMz9p

  • telegram

    https://api.telegram.org/bot6924062419:AAH4gnyXxdFAI3v9Q7dkCjzPoXbFknr155o/sendMessage?chat_id=6986550905

Targets

    • Target

      NerestPc.exe

    • Size

      2.8MB

    • MD5

      9db30dedeed5a5d3b7bee80b5bdbbc46

    • SHA1

      7cf71e9c9b433d269050011f9e76e70f083282d6

    • SHA256

      047f4f423ccd4d20d1f4f4fa9d2c4e03641b00ace5929c86327974945bb0648a

    • SHA512

      f0adc2e17ebfda0d5a0157245e3912e777509e71b7c31cbf735fedbf10f6a350661a127436fc90616067b8928fb002b79585998996857aed2b82c06590a8ba02

    • SSDEEP

      49152:AtKPduNQ7ekxGFj5pU5r08ZbSR/6x1k2akRbfSafKN8q6o5pOuP6kv21BN4CArY:AtKlum7l4pU28SR/OTRbf+8q38uSEuBd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Detect Xworm Payload

    • Modifies WinLogon for persistence

    • Xworm

      Xworm is a remote access trojan written in C#.

    • AgentTesla payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks