General
-
Target
939a42faab70585cf4aed59c73425492.exe
-
Size
472KB
-
Sample
210626-lpg4vrrfxs
-
MD5
939a42faab70585cf4aed59c73425492
-
SHA1
ccc57ed7de341f637e1ba6e671105ec304bd2c4b
-
SHA256
06febadb1cc71ef3987c339b7c862ea4cd32656c372c4f266cd1af68c355a0c0
-
SHA512
04a845f4b4db9f8fb923a10db65a1cac6cce46f52aa46eaa124b7aa710e7d063555e93f93e26dfb9fa3c28425297d080f69025fcbc73801825154cbf659abe00
Static task
static1
Behavioral task
behavioral1
Sample
939a42faab70585cf4aed59c73425492.exe
Resource
win7v20210408
Malware Config
Extracted
xpertrat
3.0.10
special X
mertrerfeyy.duckdns.org:8494
gwtruwhgw.duckdns.org:8494
dfgrttuutii.duckdns.org:8494
J0B4S3L1-T6W3-H2L6-N2T2-W4T8H1F1E6U4
Targets
-
-
Target
939a42faab70585cf4aed59c73425492.exe
-
Size
472KB
-
MD5
939a42faab70585cf4aed59c73425492
-
SHA1
ccc57ed7de341f637e1ba6e671105ec304bd2c4b
-
SHA256
06febadb1cc71ef3987c339b7c862ea4cd32656c372c4f266cd1af68c355a0c0
-
SHA512
04a845f4b4db9f8fb923a10db65a1cac6cce46f52aa46eaa124b7aa710e7d063555e93f93e26dfb9fa3c28425297d080f69025fcbc73801825154cbf659abe00
-
XpertRAT Core Payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Adds policy Run key to start application
-
Adds Run key to start application
-
Program crash
-
Suspicious use of SetThreadContext
-