Overview
overview
10Static
static
10DefenderControl.exe
windows7-x64
3DefenderControl.exe
windows10-2004-x64
3Software U...ol.exe
windows7-x64
10Software U...ol.exe
windows10-2004-x64
10Software U...l.html
windows7-x64
3Software U...l.html
windows10-2004-x64
3Telegram Channel.lnk
windows7-x64
3Telegram Channel.lnk
windows10-2004-x64
7XSSLite St...ber.js
windows7-x64
3XSSLite St...ber.js
windows10-2004-x64
3XSSLite St...ets.js
windows7-x64
3XSSLite St...ets.js
windows10-2004-x64
3XSSLite St...ram.js
windows7-x64
3XSSLite St...ram.js
windows10-2004-x64
3XSSLite St...ion.js
windows7-x64
3XSSLite St...ion.js
windows10-2004-x64
3XSSLite St...ra.dll
windows7-x64
1XSSLite St...ra.dll
windows10-2004-x64
1XSSLite St...dy.dll
windows7-x64
1XSSLite St...dy.dll
windows10-2004-x64
1XSSLite St...dy.dll
windows7-x64
1XSSLite St...dy.dll
windows10-2004-x64
1XSSLite St...dy.dll
windows7-x64
1XSSLite St...dy.dll
windows10-2004-x64
1XSSLite St...on.dll
windows7-x64
1XSSLite St...on.dll
windows10-2004-x64
1XSSLite St...rs.dll
windows7-x64
1XSSLite St...rs.dll
windows10-2004-x64
1XSSLite St...ed.dll
windows7-x64
1XSSLite St...ed.dll
windows10-2004-x64
1XSSLite St...db.dll
windows7-x64
1XSSLite St...db.dll
windows10-2004-x64
1General
-
Target
XSSLiteStealer.zip
-
Size
85.1MB
-
Sample
241220-1llessvkcw
-
MD5
c11ab323289928f5c675f1512f84842e
-
SHA1
dd837ab21971f35ae1175f8bc1a662b91126f5db
-
SHA256
90d015b08c37c5a9e9f42ada10ec29a5d34d5d6e63373eb5da9e5af6b485e688
-
SHA512
9b781f7a68708fc89432cfbbc7607ee4c74b17b1b3c5fa3addd41a0d057bac20f492307f1446803e1bc0b1944acb1aab95c018d73ef2f374f33d3c0c6453746d
-
SSDEEP
1572864:jwjvbuLAGSQPnwT25zin9KPzOsGaHDRfKZGD9K9uBukxk4Y+xRV5+aYPZ:jwL9GSq7in9KPzOsGaH0uBukVY+xRVkJ
Behavioral task
behavioral1
Sample
DefenderControl.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
DefenderControl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Software Usage Tutorial/DefenderControl.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Software Usage Tutorial/DefenderControl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Software Usage Tutorial/Software Usage Tutorial.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Software Usage Tutorial/Software Usage Tutorial.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Telegram Channel.lnk
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Telegram Channel.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
XSSLite Stealer/Client/Client/Grabber/Grabber.js
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
XSSLite Stealer/Client/Client/Grabber/Grabber.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
XSSLite Stealer/Client/Client/Grabber/Wallets.js
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
XSSLite Stealer/Client/Client/Grabber/Wallets.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
XSSLite Stealer/Client/Client/Program.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
XSSLite Stealer/Client/Client/Program.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
XSSLite Stealer/Client/Client/Protection.js
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
XSSLite Stealer/Client/Client/Protection.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
XSSLite Stealer/Client/packages/Costura.Fody.5.7.0/lib/netstandard1.0/Costura.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
XSSLite Stealer/Client/packages/Costura.Fody.5.7.0/lib/netstandard1.0/Costura.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
XSSLite Stealer/Client/packages/Costura.Fody.5.7.0/netclassicweaver/Costura.Fody.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
XSSLite Stealer/Client/packages/Costura.Fody.5.7.0/netclassicweaver/Costura.Fody.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
XSSLite Stealer/Client/packages/Costura.Fody.5.7.0/netstandardweaver/Costura.Fody.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
XSSLite Stealer/Client/packages/Costura.Fody.5.7.0/netstandardweaver/Costura.Fody.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/Fody.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/Fody.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/FodyCommon.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/FodyCommon.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/FodyHelpers.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/FodyHelpers.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/FodyIsolated.dll
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/FodyIsolated.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/Mono.Cecil.Pdb.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/Mono.Cecil.Pdb.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
DefenderControl.exe
-
Size
823KB
-
MD5
879e3d30cc1392370ab0eec1601aa1b6
-
SHA1
c85e5eb120d860b0a67e3f091d5e7c29a7643bfd
-
SHA256
704ebc20fe0c7678a2b73d97ba6ad2945ece3a7d35ba0e0a394b629570af00ca
-
SHA512
71a5987a9f2fde213992be76865c0d57a4113027adf53aa515eaaa42c8f02e895297795a3c02f60ff837dcd045fa072814567ea1b65257c8006a0aa5f3e7bd44
-
SSDEEP
12288:g1OgLdaiqSqzU7rOv/O6/NH90u9KIyburq6fAdAYmyX:g1OYdaaIO6/LXEYr8dAByX
Score3/10 -
-
-
Target
Software Usage Tutorial/DefenderControl.exe
-
Size
863KB
-
MD5
8d12786d8e9477b36557a4c1e35bbb09
-
SHA1
a26c718f62b8b6729a16e35a7b68afee101903c6
-
SHA256
4f9a3f74fb2cfa5b9e3cb5f00de44e28a44695ab7244900db2eaa9efc494f06a
-
SHA512
232a440f8946e6993f3acc57766f50c2bade37b3dc95f0bbbdaf284b169baf258d92a896d7f9df5ae7f889091772b27b856d93f5db64edbea619e03fa159732e
-
SSDEEP
12288:jiqSqzU7rOv/O6/NH90u9KIyburq6fAdAYmyy1OgLdw:jaIO6/LXEYr8dAByy1OYdw
Score10/10-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
-
-
Target
Software Usage Tutorial/Software Usage Tutorial.html
-
Size
7KB
-
MD5
403dacd0bcf0da63ac2ac682039a7f5b
-
SHA1
147c374ee4184752556f03cd31b98e343892014c
-
SHA256
85e6e28f777587fe4f0d85bacffd90dcb1047c8b0e1851b43d8bc6d6ede37d7d
-
SHA512
a19f28339122e019c68d0a302f9b53a8def7e795f681c440aba04616d354ca9eafe4d1b3baa6567179f166ec9b501113332da5940076cda5261c2314c6bdbaa7
-
SSDEEP
192:krNeVyhwQLJF2/BZsUMdQ6PbbcUqphd96foL8yo9QQplNR7AJk7IQgHahLKIkPD3:krNeVyhBLJFwBZxMOePhqphd96w4yo9a
Score3/10 -
-
-
Target
Telegram Channel.lnk
-
Size
1KB
-
MD5
4e0880288ad4607823df224723cd5c3c
-
SHA1
ca7a9cbbb1c5a2af44102a45c578b4e10601873e
-
SHA256
aeede2993a3dd6053b6bcb19fe3ad1fbb9b69fc54b5aef79ef58b279f558346f
-
SHA512
85d82b3be13368dd254fc967793813b4eb6c4b89bd21bebb27f68cf12d06dc1ae6335ec113650c30d8e6904f54163f7bc78746b1505b7494d9e220bd7d7e2d91
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
XSSLite Stealer/Client/Client/Grabber/Grabber.cs
-
Size
12KB
-
MD5
de412f286c65eaf43f1075b76fcf0e9e
-
SHA1
d6a99b7493e307da565fec1adb0b91e49bbe6086
-
SHA256
d67bda9b636a46e6ab86a96ebe07c63502d2501c8199438fd8cd9cc983792d9b
-
SHA512
3308cc741aa18cc4bec08e5be63bb82e21cb5e462759eb10601fc7a4b218b5c45cf1ba723fb94f4fe0f34265cc9c574076f399ebe2e174937590de6254b23861
-
SSDEEP
192:9cQm0PpUu7AZSuVkTzes9ayoTMCopxklhJyJozWi/o:9cX0OVZSMues98TMCrhip
Score3/10 -
-
-
Target
XSSLite Stealer/Client/Client/Grabber/Wallets.cs
-
Size
2KB
-
MD5
24858208384f2d274bb1fbd767dff89b
-
SHA1
c20567fd0c094edef42694622e312eb881503f3d
-
SHA256
156d6b65c8457675fb19b0db146de52e0a059dc32907ce7e58452b12ce9063b1
-
SHA512
df70400eac174b027e68aee4aa35bceb74c9dc6064a8c9901efaf9c490e800af98c82e8b5d71d70a452301dc3c3e967b50b9e04a6ac64a7ebc77359c9b8ea088
Score3/10 -
-
-
Target
XSSLite Stealer/Client/Client/Program.cs
-
Size
4KB
-
MD5
d75562856b6fd3474e6d9d76e820027e
-
SHA1
69930ff9ff36ed5d7d0c3c8cb1ebb0d2de84c75b
-
SHA256
41e0dd490ab6b05d58d803549da4b76ebbd3cff0f52662016e3434002eef6341
-
SHA512
ca16ad68266e64a323a294817d7ca4abb0d8bbe4b4329007c362d182c8f1be640acbc8a9a773c1802252cacbfc2a98a24c88e9c2f4688bf2eff3d0f23e1ae24c
-
SSDEEP
48:C9oUzzXA3VGZn8CjJwq2WkPT2qc2GkwutcEEwxJUnqt9O10XKV0RW2pts:SoUzzX2VO8CFkKbQW+xJUq0P0RBs
Score3/10 -
-
-
Target
XSSLite Stealer/Client/Client/Protection.cs
-
Size
1KB
-
MD5
94cdb0f894ac396431ab4d169af28eb6
-
SHA1
420a361e0b5037416dc279b31d252aed092a7428
-
SHA256
4c97acd3539e693c35579a44f829be7d30acce14c84f600a99e66572d2e84008
-
SHA512
63f35ae42e5055b65df3e61a621dfd21a87c282c4240d292ee60ab06157b8e9f2eae6461eff7e6fd0e06b36f45790e0c926a45df8fe66390a7c1a55ff524a030
Score3/10 -
-
-
Target
XSSLite Stealer/Client/packages/Costura.Fody.5.7.0/lib/netstandard1.0/Costura.dll
-
Size
4KB
-
MD5
501981c7fc457d59238eb99780efb615
-
SHA1
f1f25c01f6acf33bdd62c4f82d3ef078e76f0906
-
SHA256
41bb464ac7c0d192641077e44a59d7d89860c3c620a59961f2fc4a4be47deae3
-
SHA512
5921d0662add6c8aa075106878cc56335ccbf059d8bc7f359fe9e02a52ec657c3e5df1c718929564c09f205e4bd299b086f3e7424141f5e55ed0d756f65ee1e8
-
SSDEEP
48:6F+lni2qJfjVRPGwzCo4MhTN0KDdilETrVsH4/QWk1qyFVT2IbG:7g7KedGEiYIWM2
Score1/10 -
-
-
Target
XSSLite Stealer/Client/packages/Costura.Fody.5.7.0/netclassicweaver/Costura.Fody.dll
-
Size
193KB
-
MD5
d6ef4e35f96629ba9f9176cfc4d93b38
-
SHA1
2adee63def25e2a5993ea793180634a1d2946fd7
-
SHA256
f925017acb08ca6f8e99cd28cd6140c153efe5b241111de36b8b917a302794fa
-
SHA512
d7abb5932d7b0521816137c946a80400cf573a5047c440b9a78c4670b6926e7ae130608e6b2fa0b5e65478bf986d0e089168a80e13770a0bf91ea7a5529dd715
-
SSDEEP
3072:y+bjLBzNAiYBnAjJuCxp8kvyUUs38lsDJ5Qt/Dxk4HA7lmmVtGzGzxnzmoMi:y+bjdzNA64DlAX2zGzpzm
Score1/10 -
-
-
Target
XSSLite Stealer/Client/packages/Costura.Fody.5.7.0/netstandardweaver/Costura.Fody.dll
-
Size
196KB
-
MD5
cc6fe95d22242e0eaecc751647bb58af
-
SHA1
1aaa019f088fdd20862f97217bd347331b5bd714
-
SHA256
f8d0bbf51d54411c96b26fcee9a60d73b1170c40acb5586c9112f5bee6a23acc
-
SHA512
7e6df47eef146a9a87633ba6183121e1fffd1c3e330a2cc22bb0d915d54e162d589b8250ce867c3002fd49668f704adc0cb465afd8deed1efe7710b6e7eaacec
-
SSDEEP
3072:t+b5zlAkYBmrJuCxp8kvyUUs38lsDJ5Qt/Dxk4HA7lmmVtGzGzeIq5zhou:t+b5zlAS4DlAX2zGz1qla
Score1/10 -
-
-
Target
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/Fody.dll
-
Size
58KB
-
MD5
7dda117ba4a540765add988d4d703962
-
SHA1
a493920aabd59e97e675cd6da0d75100d61be12b
-
SHA256
b545aa2bb6b33809dea72a2262a0f403d87a05899d5bbd49727ef5b5b8a962e6
-
SHA512
b425cde90bf5bc3d2d816f683bb3a9a6d3c352d1615157db7824734a85ff74c33e561d143a7286cdd450b6e3ad647a11eb77ba314ccecbbccb209ada44822807
-
SSDEEP
1536:IMUQOggWoGnvMndHuu+VYZ8EiQRDrE+LWDMoe77NhU:IMUZGQVr7mMomNhU
Score1/10 -
-
-
Target
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/FodyCommon.dll
-
Size
16KB
-
MD5
092f6306105fc05fa41df80716e2e75e
-
SHA1
13d0830daf46109c072f511dc6eb9e582c87f92d
-
SHA256
868d483397b2d755c8685de03b76b143f590625ecaad169a575ab91afd1f3e2d
-
SHA512
3f58ccaa5a205156979debfdcfda3c991f28e1c6013823d048d7a7d0d822f2fff23d180b7083b89f2ef9877590daf29faf8f02d33b5b9dcb963bbb572a2f442e
-
SSDEEP
192:kzoOKhlMEblgkmjKGQ3N8LcY0INjE7+A+Zw1jsTPFArFbuiSGglbX9NVPZnPCX7o:L1lgkmji3N890IPwWTUglJNVq5Qh
Score1/10 -
-
-
Target
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/FodyHelpers.dll
-
Size
50KB
-
MD5
ebce73d9cc1a6cab8fddc3cede584908
-
SHA1
ad2c9ef51bc8b1ad166178bd3cb275e4a130fe6c
-
SHA256
7569aacb337116514039b35226f46d0e02672c91861f7daf6cc19923b7529556
-
SHA512
ddebb98e5562c511eda28ffdcaa7316cc00505de35d3ca441e68326ae9792e0410fbb2dec9560ff5847e8e2352e97ad5c00e8c24375a3dc60fd6afa7b06eb271
-
SSDEEP
768:QToWZwKWMC/vVbfOxF0ajPVqZ6lYThQRP8DPkPEgf8ZDlRT:QTEpM8AZVk6lTjtapRT
Score1/10 -
-
-
Target
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/FodyIsolated.dll
-
Size
41KB
-
MD5
48baf2c072c156438c77885e6c67c20c
-
SHA1
547af9da0e25a01b801d544ca3dad80ee6c5cca1
-
SHA256
3eeac2f97aed60bcd68cda1e7ff58cbec7ac63390901faeb2e14b6085a80bbae
-
SHA512
c0d350d5667ee40da09d594ebba4e4e0611e6f6317ce7fcbf5f192df733c65181d3ff650993a216909acf3259a054e4972af30a6b1f57e6b21adcd81a19e1b4f
-
SSDEEP
384:KfPU9AmZhPuGTWmAcrzl5h70Qil8nroh8PuBPOf+rMSguIBkjvM1k/r+MpCNRJUc:UmZVu2DFeOKppkRJU+UWE1qvv9A4fN
Score1/10 -
-
-
Target
XSSLite Stealer/Client/packages/Fody.6.8.0/netclassictask/Mono.Cecil.Pdb.dll
-
Size
87KB
-
MD5
bdfe84812d447cf67dc0f9b5f7b3cda8
-
SHA1
43de7a2e4f9b6e81d91cf6b56c2ef6e9d562649e
-
SHA256
25d1f19121dd780de3c8ac357a5436f7c59e3e63e2dd1d262a02092f5c371dff
-
SHA512
749eade2e98b27ef828178e52f50cefc8f88eb0a3e8049d6fa9460fcf3a9591b9d5eeec1abbf2e923ff4852b4ab2fb9c5f065840c921895359df4fe7ce574851
-
SSDEEP
1536:BfCEVETXo3f+yAvaDvNaPS/vSC6G+ALYKXgAJGsZAEcbxvjCXe6:9uiQPwvH6bArVJGXE+xveXe6
Score1/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1