General
-
Target
NerestPc.exe
-
Size
2.8MB
-
Sample
240222-tds2cace49
-
MD5
9db30dedeed5a5d3b7bee80b5bdbbc46
-
SHA1
7cf71e9c9b433d269050011f9e76e70f083282d6
-
SHA256
047f4f423ccd4d20d1f4f4fa9d2c4e03641b00ace5929c86327974945bb0648a
-
SHA512
f0adc2e17ebfda0d5a0157245e3912e777509e71b7c31cbf735fedbf10f6a350661a127436fc90616067b8928fb002b79585998996857aed2b82c06590a8ba02
-
SSDEEP
49152:AtKPduNQ7ekxGFj5pU5r08ZbSR/6x1k2akRbfSafKN8q6o5pOuP6kv21BN4CArY:AtKlum7l4pU28SR/OTRbf+8q38uSEuBd
Static task
static1
Behavioral task
behavioral1
Sample
NerestPc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
NerestPc.exe
Resource
win10v2004-20240221-en
Malware Config
Extracted
xworm
-
Install_directory
%Temp%
-
install_file
wininit.exe
-
pastebin_url
https://pastebin.com/raw/7MyeMz9p
-
telegram
https://api.telegram.org/bot6924062419:AAH4gnyXxdFAI3v9Q7dkCjzPoXbFknr155o/sendMessage?chat_id=6986550905
Targets
-
-
Target
NerestPc.exe
-
Size
2.8MB
-
MD5
9db30dedeed5a5d3b7bee80b5bdbbc46
-
SHA1
7cf71e9c9b433d269050011f9e76e70f083282d6
-
SHA256
047f4f423ccd4d20d1f4f4fa9d2c4e03641b00ace5929c86327974945bb0648a
-
SHA512
f0adc2e17ebfda0d5a0157245e3912e777509e71b7c31cbf735fedbf10f6a350661a127436fc90616067b8928fb002b79585998996857aed2b82c06590a8ba02
-
SSDEEP
49152:AtKPduNQ7ekxGFj5pU5r08ZbSR/6x1k2akRbfSafKN8q6o5pOuP6kv21BN4CArY:AtKlum7l4pU28SR/OTRbf+8q38uSEuBd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload
-
Modifies WinLogon for persistence
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1