General
-
Target
0344d6ec47d85e81c4346f14bad096c4.exe
-
Size
95KB
-
Sample
210421-1blmakj2m2
-
MD5
0344d6ec47d85e81c4346f14bad096c4
-
SHA1
425c492897eaf59eb30a96fb2229285b6076b423
-
SHA256
59c441437848b229ccf0ea69598b83e3be1664779a9c7a71142e69fc73a005fc
-
SHA512
f192f12c91174acf2571b02be9fb0e4e34d3c5501193316ca4845d2a2046a49cbc17ab64f5a33ccc7d905ae3c5da28073b3d8a86ce649d9e3dcb30d21e5f4ac6
Static task
static1
Behavioral task
behavioral1
Sample
0344d6ec47d85e81c4346f14bad096c4.exe
Resource
win7v20210410
Malware Config
Extracted
xpertrat
3.0.10
special X
ghytrty.duckdns.org:4145
spapertyy.duckdns.org:4145
L3Q7I4T2-J8A6-K6O4-W4G3-T5J7D0W2V5E0
Targets
-
-
Target
0344d6ec47d85e81c4346f14bad096c4.exe
-
Size
95KB
-
MD5
0344d6ec47d85e81c4346f14bad096c4
-
SHA1
425c492897eaf59eb30a96fb2229285b6076b423
-
SHA256
59c441437848b229ccf0ea69598b83e3be1664779a9c7a71142e69fc73a005fc
-
SHA512
f192f12c91174acf2571b02be9fb0e4e34d3c5501193316ca4845d2a2046a49cbc17ab64f5a33ccc7d905ae3c5da28073b3d8a86ce649d9e3dcb30d21e5f4ac6
-
XpertRAT Core Payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Adds policy Run key to start application
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-