General

  • Target

    ee759b97c88356e23b04afa427c6cb94

  • Size

    172KB

  • Sample

    210713-6qerj36v7s

  • MD5

    ee759b97c88356e23b04afa427c6cb94

  • SHA1

    439eba6c162e5512533ada4576de9f0e32def9d7

  • SHA256

    5c1fec4300276bd8bd042cf24f256de87350ad32a456578da4eb364de9f3fbfc

  • SHA512

    0447961f3ecfdfb5369cdd6f7bbc8d3455dcc8eaece606c85b9774f9c7981f26fea32133ea1c5214bbf73caea8c936257a1b349d2e7cee171f508ad1d4f050a0

Malware Config

Extracted

Family

xpertrat

Version

3.1.9

Botnet

BXK

C2

ioxg.ix.tc:4000

Mutex

R4W8O5A3-P0G7-Q7U5-H114-L7S6L4U0I6I6

Targets

    • Target

      ee759b97c88356e23b04afa427c6cb94

    • Size

      172KB

    • MD5

      ee759b97c88356e23b04afa427c6cb94

    • SHA1

      439eba6c162e5512533ada4576de9f0e32def9d7

    • SHA256

      5c1fec4300276bd8bd042cf24f256de87350ad32a456578da4eb364de9f3fbfc

    • SHA512

      0447961f3ecfdfb5369cdd6f7bbc8d3455dcc8eaece606c85b9774f9c7981f26fea32133ea1c5214bbf73caea8c936257a1b349d2e7cee171f508ad1d4f050a0

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • XpertRAT Core Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Adds policy Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Program crash

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks