General

  • Target

    Payment_Swift 20210930.doc

  • Size

    271KB

  • Sample

    210930-tvj5rsacbr

  • MD5

    28baa3fb9c80b7604bbc81962e5414b3

  • SHA1

    6b61e6dc6eeeab42d9665659e3bc353bb913716d

  • SHA256

    39c889d91c4bc0fe97e2c565d3a0e103372ba15f988872d049b9277473a87e24

  • SHA512

    cb6cbe0e8be6e36dabd18613857f34b1b30871667fa594151d367c789765c277ed23fc882c4f11dca3ffdeae82aa71dad395a0210003643e7f796dc16db3d2a1

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

httP://avira.ydns.eu/EXCEL.exe

Extracted

Family

xpertrat

Version

3.0.10

Botnet

Test

C2

kapasky-antivirus.firewall-gateway.net:4000

Mutex

L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0

Targets

    • Target

      Payment_Swift 20210930.doc

    • Size

      271KB

    • MD5

      28baa3fb9c80b7604bbc81962e5414b3

    • SHA1

      6b61e6dc6eeeab42d9665659e3bc353bb913716d

    • SHA256

      39c889d91c4bc0fe97e2c565d3a0e103372ba15f988872d049b9277473a87e24

    • SHA512

      cb6cbe0e8be6e36dabd18613857f34b1b30871667fa594151d367c789765c277ed23fc882c4f11dca3ffdeae82aa71dad395a0210003643e7f796dc16db3d2a1

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • XpertRAT Core Payload

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks