General

  • Target

    C202000000164556_pdf.exe

  • Size

    1.1MB

  • Sample

    201023-kytbb3bkb6

  • MD5

    672849391b8b92a05c59640f1765b3d0

  • SHA1

    4b46fb7e3b25d33b40f5894b0894f62f61a288b7

  • SHA256

    c675725093fc52813ef776f4c04acb080bcc017691987fd2c8db555911f6ab13

  • SHA512

    9fec40a262ba8f025c3c5560598f104ccea5f7a9f5b96074a99efe2f8f6ffdcc001bcd22cd4eb2f6ca776069b57cca1220efc6bf9676cadbf5fa9ec7e31d3bee

Malware Config

Extracted

Family

xpertrat

Version

3.0.10

Botnet

xbox

C2

79.134.225.97:4726

79.134.225.97:7892

Mutex

Y1E5W2H0-W6U4-R5S1-S8J1-I3T1C6W3P336

Targets

    • Target

      C202000000164556_pdf.exe

    • Size

      1.1MB

    • MD5

      672849391b8b92a05c59640f1765b3d0

    • SHA1

      4b46fb7e3b25d33b40f5894b0894f62f61a288b7

    • SHA256

      c675725093fc52813ef776f4c04acb080bcc017691987fd2c8db555911f6ab13

    • SHA512

      9fec40a262ba8f025c3c5560598f104ccea5f7a9f5b96074a99efe2f8f6ffdcc001bcd22cd4eb2f6ca776069b57cca1220efc6bf9676cadbf5fa9ec7e31d3bee

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • XpertRAT Core Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Adds policy Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

6
T1112

Discovery

System Information Discovery

1
T1082

Tasks