General

  • Target

    d97e3dcbb6d173e9f0d3b76fbecdad0d.exe

  • Size

    799KB

  • Sample

    210421-wxdhbm9hf6

  • MD5

    d97e3dcbb6d173e9f0d3b76fbecdad0d

  • SHA1

    e4a169cece454e23c0de2aa3bec30a08d1422e25

  • SHA256

    ad7352ddb27f165faa309916430d17aead69a6359f74d163c0c488bb551b3fb0

  • SHA512

    4a928ef2927822b7919b017f2c1b073a9c88c1adbd572fbf2ec66bb4933ea8642075678c0a32817b4ca529f9730fd0c3f4f43daa34dfa09a66faf1d86220ef3c

Malware Config

Extracted

Family

xpertrat

Version

3.0.10

Botnet

special X

C2

ghytrty.duckdns.org:4145

spapertyy.duckdns.org:4145

Mutex

L3Q7I4T2-J8A6-K6O4-W4G3-T5J7D0W2V5E0

Targets

    • Target

      d97e3dcbb6d173e9f0d3b76fbecdad0d.exe

    • Size

      799KB

    • MD5

      d97e3dcbb6d173e9f0d3b76fbecdad0d

    • SHA1

      e4a169cece454e23c0de2aa3bec30a08d1422e25

    • SHA256

      ad7352ddb27f165faa309916430d17aead69a6359f74d163c0c488bb551b3fb0

    • SHA512

      4a928ef2927822b7919b017f2c1b073a9c88c1adbd572fbf2ec66bb4933ea8642075678c0a32817b4ca529f9730fd0c3f4f43daa34dfa09a66faf1d86220ef3c

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • XpertRAT Core Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Adds policy Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Program crash

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks