General

  • Target

    RFQ#00439811.exe

  • Size

    495KB

  • Sample

    211123-kzge1acgd4

  • MD5

    d14619b1c5ca20c8e78749949ce6855b

  • SHA1

    6118f6e8a6fc209cce15c8019d5684902579e12d

  • SHA256

    a399cf91b76479c1dd9381dfffb1521b69822894d8862ef00273878546b2a9d7

  • SHA512

    734fee664a84b7c092db72586add7b4238f01e71328936121fb4e4d6c22f10bb066609ff5e0fde6b35f96af895b4afcd334b751e82a396b47f935ad80372ebaa

Malware Config

Targets

    • Target

      RFQ#00439811.exe

    • Size

      495KB

    • MD5

      d14619b1c5ca20c8e78749949ce6855b

    • SHA1

      6118f6e8a6fc209cce15c8019d5684902579e12d

    • SHA256

      a399cf91b76479c1dd9381dfffb1521b69822894d8862ef00273878546b2a9d7

    • SHA512

      734fee664a84b7c092db72586add7b4238f01e71328936121fb4e4d6c22f10bb066609ff5e0fde6b35f96af895b4afcd334b751e82a396b47f935ad80372ebaa

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • Looks for VirtualBox Guest Additions in registry

    • Adds policy Run key to start application

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

6
T1112

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks