General

  • Target

    0344d6ec47d85e81c4346f14bad096c4.exe

  • Size

    95KB

  • Sample

    210421-1blmakj2m2

  • MD5

    0344d6ec47d85e81c4346f14bad096c4

  • SHA1

    425c492897eaf59eb30a96fb2229285b6076b423

  • SHA256

    59c441437848b229ccf0ea69598b83e3be1664779a9c7a71142e69fc73a005fc

  • SHA512

    f192f12c91174acf2571b02be9fb0e4e34d3c5501193316ca4845d2a2046a49cbc17ab64f5a33ccc7d905ae3c5da28073b3d8a86ce649d9e3dcb30d21e5f4ac6

Malware Config

Extracted

Family

xpertrat

Version

3.0.10

Botnet

special X

C2

ghytrty.duckdns.org:4145

spapertyy.duckdns.org:4145

Mutex

L3Q7I4T2-J8A6-K6O4-W4G3-T5J7D0W2V5E0

Targets

    • Target

      0344d6ec47d85e81c4346f14bad096c4.exe

    • Size

      95KB

    • MD5

      0344d6ec47d85e81c4346f14bad096c4

    • SHA1

      425c492897eaf59eb30a96fb2229285b6076b423

    • SHA256

      59c441437848b229ccf0ea69598b83e3be1664779a9c7a71142e69fc73a005fc

    • SHA512

      f192f12c91174acf2571b02be9fb0e4e34d3c5501193316ca4845d2a2046a49cbc17ab64f5a33ccc7d905ae3c5da28073b3d8a86ce649d9e3dcb30d21e5f4ac6

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • XpertRAT Core Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Adds policy Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks