General
-
Target
95a3b26416f41375ef06106fb58a3764.exe
-
Size
807KB
-
Sample
210426-kchlc7f78s
-
MD5
95a3b26416f41375ef06106fb58a3764
-
SHA1
952f57980d5105d94bc2e0ae389f0cc7e44ae27d
-
SHA256
f8e52fa75724eb08c0ec68db6799740ad36c7178b8f0dd7c8b0ee755ff60c653
-
SHA512
160e9dd666333b81c9685a21fd7620b499e9973743b637d4f52a30567c1a81fcc9cba4a984e9c1715dd9d36993034ec0697c36327803754ef725eb6d86e991b8
Static task
static1
Behavioral task
behavioral1
Sample
95a3b26416f41375ef06106fb58a3764.exe
Resource
win7v20210408
Malware Config
Extracted
xpertrat
3.0.10
XXX
kapasky-antivirus.firewall-gateway.net:2054
kapasky-antivirus.firewall-gateway.net:4000
U4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7
Targets
-
-
Target
95a3b26416f41375ef06106fb58a3764.exe
-
Size
807KB
-
MD5
95a3b26416f41375ef06106fb58a3764
-
SHA1
952f57980d5105d94bc2e0ae389f0cc7e44ae27d
-
SHA256
f8e52fa75724eb08c0ec68db6799740ad36c7178b8f0dd7c8b0ee755ff60c653
-
SHA512
160e9dd666333b81c9685a21fd7620b499e9973743b637d4f52a30567c1a81fcc9cba4a984e9c1715dd9d36993034ec0697c36327803754ef725eb6d86e991b8
-
XpertRAT Core Payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Adds policy Run key to start application
-
Adds Run key to start application
-
Program crash
-
Suspicious use of SetThreadContext
-