General
-
Target
gunzipped.exe
-
Size
1.5MB
-
Sample
210415-ykqbwa9cvj
-
MD5
bde5cc055efbc8779784a94811e3e5a5
-
SHA1
629afe08ffe9d3660e7fd3918122af70fa49a5fd
-
SHA256
21d8f3869dae855f7ddb202eca9bc170074ab405c7741cbd4ffb48960494234f
-
SHA512
bc5dc3ed61fa9d00866219395a8ef6cb64ef8b7ee2ad20034b5840d5a7d92816bac22f61175eed75ee039a929eb7184a90c3ee480346249a508768c9f6cf15ff
Static task
static1
Behavioral task
behavioral1
Sample
gunzipped.exe
Resource
win7v20210410
Malware Config
Extracted
xpertrat
3.0.10
sales
79.134.225.117:5935
V8V5U6A3-F774-P2N8-M6H6-L4M443J6G7A1
Targets
-
-
Target
gunzipped.exe
-
Size
1.5MB
-
MD5
bde5cc055efbc8779784a94811e3e5a5
-
SHA1
629afe08ffe9d3660e7fd3918122af70fa49a5fd
-
SHA256
21d8f3869dae855f7ddb202eca9bc170074ab405c7741cbd4ffb48960494234f
-
SHA512
bc5dc3ed61fa9d00866219395a8ef6cb64ef8b7ee2ad20034b5840d5a7d92816bac22f61175eed75ee039a929eb7184a90c3ee480346249a508768c9f6cf15ff
-
XpertRAT Core Payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Adds policy Run key to start application
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-