General
-
Target
00279cce20bb484f9ea1b89efc6be08e.exe
-
Size
918KB
-
Sample
210422-bn2yjb75we
-
MD5
00279cce20bb484f9ea1b89efc6be08e
-
SHA1
da931ab637a622626fc2fb8a326fd6ccce931f66
-
SHA256
877b28707372fb7365c52a314233c74877045cf1d8143fe83fb257f0bf90c248
-
SHA512
f7c61894b3d07cfbd9ee4aaf2fecefd3096d28feb02c43a39cf809ab441b5a82c9ddb534992f1a0fc552d4eed1465a56782eeee73abc27ddb67c74b910d71508
Static task
static1
Behavioral task
behavioral1
Sample
00279cce20bb484f9ea1b89efc6be08e.exe
Resource
win7v20210410
Malware Config
Extracted
xpertrat
3.0.10
XXX
kapasky-antivirus.firewall-gateway.net:2054
kapasky-antivirus.firewall-gateway.net:4000
U4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7
Targets
-
-
Target
00279cce20bb484f9ea1b89efc6be08e.exe
-
Size
918KB
-
MD5
00279cce20bb484f9ea1b89efc6be08e
-
SHA1
da931ab637a622626fc2fb8a326fd6ccce931f66
-
SHA256
877b28707372fb7365c52a314233c74877045cf1d8143fe83fb257f0bf90c248
-
SHA512
f7c61894b3d07cfbd9ee4aaf2fecefd3096d28feb02c43a39cf809ab441b5a82c9ddb534992f1a0fc552d4eed1465a56782eeee73abc27ddb67c74b910d71508
-
XpertRAT Core Payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Adds policy Run key to start application
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-