General
-
Target
RFQ 13970 DT.exe
-
Size
536KB
-
Sample
201109-v9ndalt5kj
-
MD5
7fdc62d82d767e18af6869c620a52cd1
-
SHA1
b9943156ba008c49589df08a936f213ecdf52729
-
SHA256
276963ec4efb403c18a96f94786c7b9f775a1bb22169636d8f594241288df9d3
-
SHA512
10d516a75e3805268f28ddb4d86ecd438bb9f7823797112d55470f13c7286b91141d43c251cb04fff7d1090ef954d3b4d1fa264c28b6d930da60045ab977773b
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 13970 DT.exe
Resource
win7v20201028
Malware Config
Extracted
xpertrat
3.0.10
msn
194.5.99.136:3135
79.134.225.85:3135
G2G228Q5-P8H1-G1U7-U4L6-D1K007E3Y0Y8
Targets
-
-
Target
RFQ 13970 DT.exe
-
Size
536KB
-
MD5
7fdc62d82d767e18af6869c620a52cd1
-
SHA1
b9943156ba008c49589df08a936f213ecdf52729
-
SHA256
276963ec4efb403c18a96f94786c7b9f775a1bb22169636d8f594241288df9d3
-
SHA512
10d516a75e3805268f28ddb4d86ecd438bb9f7823797112d55470f13c7286b91141d43c251cb04fff7d1090ef954d3b4d1fa264c28b6d930da60045ab977773b
-
XpertRAT Core Payload
-
Adds policy Run key to start application
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-