General

  • Target

    95a3b26416f41375ef06106fb58a3764.exe

  • Size

    807KB

  • Sample

    210426-em4qwbjnna

  • MD5

    95a3b26416f41375ef06106fb58a3764

  • SHA1

    952f57980d5105d94bc2e0ae389f0cc7e44ae27d

  • SHA256

    f8e52fa75724eb08c0ec68db6799740ad36c7178b8f0dd7c8b0ee755ff60c653

  • SHA512

    160e9dd666333b81c9685a21fd7620b499e9973743b637d4f52a30567c1a81fcc9cba4a984e9c1715dd9d36993034ec0697c36327803754ef725eb6d86e991b8

Malware Config

Extracted

Family

xpertrat

Version

3.0.10

Botnet

XXX

C2

kapasky-antivirus.firewall-gateway.net:2054

kapasky-antivirus.firewall-gateway.net:4000

Mutex

U4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7

Targets

    • Target

      95a3b26416f41375ef06106fb58a3764.exe

    • Size

      807KB

    • MD5

      95a3b26416f41375ef06106fb58a3764

    • SHA1

      952f57980d5105d94bc2e0ae389f0cc7e44ae27d

    • SHA256

      f8e52fa75724eb08c0ec68db6799740ad36c7178b8f0dd7c8b0ee755ff60c653

    • SHA512

      160e9dd666333b81c9685a21fd7620b499e9973743b637d4f52a30567c1a81fcc9cba4a984e9c1715dd9d36993034ec0697c36327803754ef725eb6d86e991b8

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • XpertRAT Core Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Adds policy Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks