General

  • Target

    b6e19d6eff5e92815130648f931b9425.exe

  • Size

    822KB

  • Sample

    210421-yrq3d8r6k6

  • MD5

    b6e19d6eff5e92815130648f931b9425

  • SHA1

    32af8fb009f92eec12ee99fd871c56e5fb497e6c

  • SHA256

    1bc32420315bf439659c6ca7426e068cb1acab9d5320006a40aeff025318893f

  • SHA512

    ad3430addf44ed7ea2295d8bb07018c2789e5f0f0a0bd3c0aacb69f5486f49a04c8003015d06ee9b68f7d8b141615af818cd3d1c17e8a8f8c08c87f225264665

Malware Config

Extracted

Family

xpertrat

Version

3.0.10

Botnet

special X

C2

ghytrty.duckdns.org:4145

spapertyy.duckdns.org:4145

Mutex

L3Q7I4T2-J8A6-K6O4-W4G3-T5J7D0W2V5E0

Targets

    • Target

      b6e19d6eff5e92815130648f931b9425.exe

    • Size

      822KB

    • MD5

      b6e19d6eff5e92815130648f931b9425

    • SHA1

      32af8fb009f92eec12ee99fd871c56e5fb497e6c

    • SHA256

      1bc32420315bf439659c6ca7426e068cb1acab9d5320006a40aeff025318893f

    • SHA512

      ad3430addf44ed7ea2295d8bb07018c2789e5f0f0a0bd3c0aacb69f5486f49a04c8003015d06ee9b68f7d8b141615af818cd3d1c17e8a8f8c08c87f225264665

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • XpertRAT Core Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Adds policy Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Program crash

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks