General

  • Target

    gunzipped.exe

  • Size

    1.5MB

  • Sample

    210415-ykqbwa9cvj

  • MD5

    bde5cc055efbc8779784a94811e3e5a5

  • SHA1

    629afe08ffe9d3660e7fd3918122af70fa49a5fd

  • SHA256

    21d8f3869dae855f7ddb202eca9bc170074ab405c7741cbd4ffb48960494234f

  • SHA512

    bc5dc3ed61fa9d00866219395a8ef6cb64ef8b7ee2ad20034b5840d5a7d92816bac22f61175eed75ee039a929eb7184a90c3ee480346249a508768c9f6cf15ff

Malware Config

Extracted

Family

xpertrat

Version

3.0.10

Botnet

sales

C2

79.134.225.117:5935

Mutex

V8V5U6A3-F774-P2N8-M6H6-L4M443J6G7A1

Targets

    • Target

      gunzipped.exe

    • Size

      1.5MB

    • MD5

      bde5cc055efbc8779784a94811e3e5a5

    • SHA1

      629afe08ffe9d3660e7fd3918122af70fa49a5fd

    • SHA256

      21d8f3869dae855f7ddb202eca9bc170074ab405c7741cbd4ffb48960494234f

    • SHA512

      bc5dc3ed61fa9d00866219395a8ef6cb64ef8b7ee2ad20034b5840d5a7d92816bac22f61175eed75ee039a929eb7184a90c3ee480346249a508768c9f6cf15ff

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • XpertRAT Core Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Adds policy Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks