General

  • Target

    6f30fbccbd98d50cf0d069d0105d398cbf34b1c8a1741cfab07bd279f19a8ccd.exe

  • Size

    110KB

  • Sample

    250202-pm7tms1pbx

  • MD5

    f8560cdd1d4777e85ea14e41ff1b4419

  • SHA1

    fcba377b75b3de24d8a1ba4983a367b794a64581

  • SHA256

    6f30fbccbd98d50cf0d069d0105d398cbf34b1c8a1741cfab07bd279f19a8ccd

  • SHA512

    f038a71e6b8617047ff202604f8dd1d684c1eb788281cb603eeab700e286bd445fb0e4d4b592443bc005c345c1f7bc38470207188c8b2510b1dc28af5f05f609

  • SSDEEP

    1536:JxqjQ+P04wsmJCzbMmVMxk6Gz3SOYJlVIDhi0Y9JLwIbcuraGMc/Fv57IB9:sr85CzbMmXGOYJlKDk9jP957+9

Malware Config

Targets

    • Target

      6f30fbccbd98d50cf0d069d0105d398cbf34b1c8a1741cfab07bd279f19a8ccd.exe

    • Size

      110KB

    • MD5

      f8560cdd1d4777e85ea14e41ff1b4419

    • SHA1

      fcba377b75b3de24d8a1ba4983a367b794a64581

    • SHA256

      6f30fbccbd98d50cf0d069d0105d398cbf34b1c8a1741cfab07bd279f19a8ccd

    • SHA512

      f038a71e6b8617047ff202604f8dd1d684c1eb788281cb603eeab700e286bd445fb0e4d4b592443bc005c345c1f7bc38470207188c8b2510b1dc28af5f05f609

    • SSDEEP

      1536:JxqjQ+P04wsmJCzbMmVMxk6Gz3SOYJlVIDhi0Y9JLwIbcuraGMc/Fv57IB9:sr85CzbMmXGOYJlKDk9jP957+9

    • Detect Neshta payload

    • Detect Xworm Payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks