General
-
Target
bc2a5e452669de43c4f4533c995b515bace2941ea5b45bb537085b204ee5d54b
-
Size
33KB
-
Sample
210921-ttdxcsaaa2
-
MD5
49af0abba03a7d559171f378728e9bc7
-
SHA1
7e6e1ccf693bb62f2a36119996583228a9e5c665
-
SHA256
bc2a5e452669de43c4f4533c995b515bace2941ea5b45bb537085b204ee5d54b
-
SHA512
d155349a6dae76775b26a96ec00a8dc860749eb46450c6dcc479303afa01325b1fb31b41c8adac3cbabb2b17c7b23a6768949a8bf5221c3edee0a25082e71a8f
Static task
static1
Malware Config
Extracted
xpertrat
3.0.10
Test
kapasky-antivirus.firewall-gateway.net:4000
L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0
Targets
-
-
Target
bc2a5e452669de43c4f4533c995b515bace2941ea5b45bb537085b204ee5d54b
-
Size
33KB
-
MD5
49af0abba03a7d559171f378728e9bc7
-
SHA1
7e6e1ccf693bb62f2a36119996583228a9e5c665
-
SHA256
bc2a5e452669de43c4f4533c995b515bace2941ea5b45bb537085b204ee5d54b
-
SHA512
d155349a6dae76775b26a96ec00a8dc860749eb46450c6dcc479303afa01325b1fb31b41c8adac3cbabb2b17c7b23a6768949a8bf5221c3edee0a25082e71a8f
-
XpertRAT Core Payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Adds policy Run key to start application
-
Deletes itself
-
Adds Run key to start application
-
Program crash
-
Suspicious use of SetThreadContext
-