General

  • Target

    939a42faab70585cf4aed59c73425492.exe

  • Size

    472KB

  • Sample

    210626-lpg4vrrfxs

  • MD5

    939a42faab70585cf4aed59c73425492

  • SHA1

    ccc57ed7de341f637e1ba6e671105ec304bd2c4b

  • SHA256

    06febadb1cc71ef3987c339b7c862ea4cd32656c372c4f266cd1af68c355a0c0

  • SHA512

    04a845f4b4db9f8fb923a10db65a1cac6cce46f52aa46eaa124b7aa710e7d063555e93f93e26dfb9fa3c28425297d080f69025fcbc73801825154cbf659abe00

Malware Config

Extracted

Family

xpertrat

Version

3.0.10

Botnet

special X

C2

mertrerfeyy.duckdns.org:8494

gwtruwhgw.duckdns.org:8494

dfgrttuutii.duckdns.org:8494

Mutex

J0B4S3L1-T6W3-H2L6-N2T2-W4T8H1F1E6U4

Targets

    • Target

      939a42faab70585cf4aed59c73425492.exe

    • Size

      472KB

    • MD5

      939a42faab70585cf4aed59c73425492

    • SHA1

      ccc57ed7de341f637e1ba6e671105ec304bd2c4b

    • SHA256

      06febadb1cc71ef3987c339b7c862ea4cd32656c372c4f266cd1af68c355a0c0

    • SHA512

      04a845f4b4db9f8fb923a10db65a1cac6cce46f52aa46eaa124b7aa710e7d063555e93f93e26dfb9fa3c28425297d080f69025fcbc73801825154cbf659abe00

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • XpertRAT Core Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Adds policy Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Program crash

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks