General

  • Target

    RFQ 13970 DT.exe

  • Size

    536KB

  • Sample

    201109-v9ndalt5kj

  • MD5

    7fdc62d82d767e18af6869c620a52cd1

  • SHA1

    b9943156ba008c49589df08a936f213ecdf52729

  • SHA256

    276963ec4efb403c18a96f94786c7b9f775a1bb22169636d8f594241288df9d3

  • SHA512

    10d516a75e3805268f28ddb4d86ecd438bb9f7823797112d55470f13c7286b91141d43c251cb04fff7d1090ef954d3b4d1fa264c28b6d930da60045ab977773b

Malware Config

Extracted

Family

xpertrat

Version

3.0.10

Botnet

msn

C2

194.5.99.136:3135

79.134.225.85:3135

Mutex

G2G228Q5-P8H1-G1U7-U4L6-D1K007E3Y0Y8

Targets

    • Target

      RFQ 13970 DT.exe

    • Size

      536KB

    • MD5

      7fdc62d82d767e18af6869c620a52cd1

    • SHA1

      b9943156ba008c49589df08a936f213ecdf52729

    • SHA256

      276963ec4efb403c18a96f94786c7b9f775a1bb22169636d8f594241288df9d3

    • SHA512

      10d516a75e3805268f28ddb4d86ecd438bb9f7823797112d55470f13c7286b91141d43c251cb04fff7d1090ef954d3b4d1fa264c28b6d930da60045ab977773b

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • XpertRAT Core Payload

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Adds policy Run key to start application

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

6
T1112

Discovery

System Information Discovery

1
T1082

Tasks