General

  • Target

    00279cce20bb484f9ea1b89efc6be08e.exe

  • Size

    918KB

  • Sample

    210422-bn2yjb75we

  • MD5

    00279cce20bb484f9ea1b89efc6be08e

  • SHA1

    da931ab637a622626fc2fb8a326fd6ccce931f66

  • SHA256

    877b28707372fb7365c52a314233c74877045cf1d8143fe83fb257f0bf90c248

  • SHA512

    f7c61894b3d07cfbd9ee4aaf2fecefd3096d28feb02c43a39cf809ab441b5a82c9ddb534992f1a0fc552d4eed1465a56782eeee73abc27ddb67c74b910d71508

Malware Config

Extracted

Family

xpertrat

Version

3.0.10

Botnet

XXX

C2

kapasky-antivirus.firewall-gateway.net:2054

kapasky-antivirus.firewall-gateway.net:4000

Mutex

U4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7

Targets

    • Target

      00279cce20bb484f9ea1b89efc6be08e.exe

    • Size

      918KB

    • MD5

      00279cce20bb484f9ea1b89efc6be08e

    • SHA1

      da931ab637a622626fc2fb8a326fd6ccce931f66

    • SHA256

      877b28707372fb7365c52a314233c74877045cf1d8143fe83fb257f0bf90c248

    • SHA512

      f7c61894b3d07cfbd9ee4aaf2fecefd3096d28feb02c43a39cf809ab441b5a82c9ddb534992f1a0fc552d4eed1465a56782eeee73abc27ddb67c74b910d71508

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • XpertRAT Core Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Adds policy Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks