General
-
Target
d76c5a676e641b431ac0a9dded9c505d.exe
-
Size
823KB
-
Sample
210421-nla19xzcea
-
MD5
d76c5a676e641b431ac0a9dded9c505d
-
SHA1
62bc6251747312cc7307c2c49cf14d511d0bfcdd
-
SHA256
d5325b0dfdd73327d48c0e069567ce843a68f10d7fe0301a74dad13d6422eee2
-
SHA512
0c4c8206529fe1469476e2e51c01a6bf3d6a5444c223ed074925c324fe235214272d010ab42ce9478f2e31a7f7aff6d7eb885f569d7cc7ac67c27aa6c49b73c9
Static task
static1
Behavioral task
behavioral1
Sample
d76c5a676e641b431ac0a9dded9c505d.exe
Resource
win7v20210408
Malware Config
Extracted
xpertrat
3.0.10
XXX
kapasky-antivirus.firewall-gateway.net:2054
kapasky-antivirus.firewall-gateway.net:4000
U4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7
Targets
-
-
Target
d76c5a676e641b431ac0a9dded9c505d.exe
-
Size
823KB
-
MD5
d76c5a676e641b431ac0a9dded9c505d
-
SHA1
62bc6251747312cc7307c2c49cf14d511d0bfcdd
-
SHA256
d5325b0dfdd73327d48c0e069567ce843a68f10d7fe0301a74dad13d6422eee2
-
SHA512
0c4c8206529fe1469476e2e51c01a6bf3d6a5444c223ed074925c324fe235214272d010ab42ce9478f2e31a7f7aff6d7eb885f569d7cc7ac67c27aa6c49b73c9
-
XpertRAT Core Payload
-
Adds policy Run key to start application
-
Adds Run key to start application
-
Program crash
-
Suspicious use of SetThreadContext
-