General

  • Target

    704ce624d4906a3cf343562b90249b58.exe

  • Size

    759KB

  • Sample

    210713-nrzh4f9wpx

  • MD5

    704ce624d4906a3cf343562b90249b58

  • SHA1

    c007c6fb7c85795c2cdf5b2171392dedf72a5c9e

  • SHA256

    59d18f1afca7fa22d68455d412c29949993c21edfb3658091bdad62093e0f818

  • SHA512

    d3c285ce095cb72dc4fb7de298bc59235ed727bb99fbe0c0eea7f4aea53b4270d707ae164866dc18eef268375b3f683e7506f3582210b59d0e1fdf6aac8e1f08

Malware Config

Extracted

Family

xpertrat

Version

3.1.9

Botnet

BXK

C2

ioxg.ix.tc:4000

Mutex

R4W8O5A3-P0G7-Q7U5-H114-L7S6L4U0I6I6

Targets

    • Target

      704ce624d4906a3cf343562b90249b58.exe

    • Size

      759KB

    • MD5

      704ce624d4906a3cf343562b90249b58

    • SHA1

      c007c6fb7c85795c2cdf5b2171392dedf72a5c9e

    • SHA256

      59d18f1afca7fa22d68455d412c29949993c21edfb3658091bdad62093e0f818

    • SHA512

      d3c285ce095cb72dc4fb7de298bc59235ed727bb99fbe0c0eea7f4aea53b4270d707ae164866dc18eef268375b3f683e7506f3582210b59d0e1fdf6aac8e1f08

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

6
T1112

Discovery

System Information Discovery

1
T1082

Tasks