General
-
Target
Payment_Swift 20210930.doc
-
Size
271KB
-
Sample
210930-tvj5rsacbr
-
MD5
28baa3fb9c80b7604bbc81962e5414b3
-
SHA1
6b61e6dc6eeeab42d9665659e3bc353bb913716d
-
SHA256
39c889d91c4bc0fe97e2c565d3a0e103372ba15f988872d049b9277473a87e24
-
SHA512
cb6cbe0e8be6e36dabd18613857f34b1b30871667fa594151d367c789765c277ed23fc882c4f11dca3ffdeae82aa71dad395a0210003643e7f796dc16db3d2a1
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Swift 20210930.doc
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Payment_Swift 20210930.doc
Resource
win10v20210408
Malware Config
Extracted
httP://avira.ydns.eu/EXCEL.exe
Extracted
xpertrat
3.0.10
Test
kapasky-antivirus.firewall-gateway.net:4000
L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0
Targets
-
-
Target
Payment_Swift 20210930.doc
-
Size
271KB
-
MD5
28baa3fb9c80b7604bbc81962e5414b3
-
SHA1
6b61e6dc6eeeab42d9665659e3bc353bb913716d
-
SHA256
39c889d91c4bc0fe97e2c565d3a0e103372ba15f988872d049b9277473a87e24
-
SHA512
cb6cbe0e8be6e36dabd18613857f34b1b30871667fa594151d367c789765c277ed23fc882c4f11dca3ffdeae82aa71dad395a0210003643e7f796dc16db3d2a1
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
XpertRAT Core Payload
-
Adds policy Run key to start application
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-