General
-
Target
9b0315924b8b25d861199d276becfd34.exe
-
Size
1.2MB
-
Sample
210629-p315pw6l2x
-
MD5
9b0315924b8b25d861199d276becfd34
-
SHA1
6f6dbce9332a844976698b75911c77afebb1543f
-
SHA256
c109fdc9eebddd35215c226381a886b4f2fdec8956ac9cfc428cbb6ef3405777
-
SHA512
b3528f7c4b0b3aa812e3b8113e7ee924f8ae34ab801c6a6cf20d56d30adba757f57041d8c6530cb6fc7c42a8b1894613ca54e0ceac0795e14dfa2a1e8ecf3d5d
Static task
static1
Behavioral task
behavioral1
Sample
9b0315924b8b25d861199d276becfd34.exe
Resource
win7v20210408
Malware Config
Extracted
xpertrat
3.0.10
special X
mertrerfeyy.duckdns.org:8494
gwtruwhgw.duckdns.org:8494
dfgrttuutii.duckdns.org:8494
J0B4S3L1-T6W3-H2L6-N2T2-W4T8H1F1E6U4
Targets
-
-
Target
9b0315924b8b25d861199d276becfd34.exe
-
Size
1.2MB
-
MD5
9b0315924b8b25d861199d276becfd34
-
SHA1
6f6dbce9332a844976698b75911c77afebb1543f
-
SHA256
c109fdc9eebddd35215c226381a886b4f2fdec8956ac9cfc428cbb6ef3405777
-
SHA512
b3528f7c4b0b3aa812e3b8113e7ee924f8ae34ab801c6a6cf20d56d30adba757f57041d8c6530cb6fc7c42a8b1894613ca54e0ceac0795e14dfa2a1e8ecf3d5d
-
XpertRAT Core Payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Adds policy Run key to start application
-
Adds Run key to start application
-
Program crash
-
Suspicious use of SetThreadContext
-