General

  • Target

    INVNOVPAY30002021001199554Pay5443545632211000.exe

  • Size

    1.7MB

  • Sample

    211201-jxrbraaggn

  • MD5

    b139dd38b0aaa785c555310ac2b1c3fd

  • SHA1

    5873995badb3843e97bf6cfe87bcd283c30fb393

  • SHA256

    ac0f87add6a605e555dc559282160c2ef708ca2fecc0799442c361c2f37f6828

  • SHA512

    ea5d759be0547822763607133d3c43ae44fa9f5a5b55ea3ff4456b37152a5243e9911162debb6422473ef0e81c4d33bb0ca7d4c4a978d600beccfa7850c23ecf

Malware Config

Targets

    • Target

      INVNOVPAY30002021001199554Pay5443545632211000.exe

    • Size

      1.7MB

    • MD5

      b139dd38b0aaa785c555310ac2b1c3fd

    • SHA1

      5873995badb3843e97bf6cfe87bcd283c30fb393

    • SHA256

      ac0f87add6a605e555dc559282160c2ef708ca2fecc0799442c361c2f37f6828

    • SHA512

      ea5d759be0547822763607133d3c43ae44fa9f5a5b55ea3ff4456b37152a5243e9911162debb6422473ef0e81c4d33bb0ca7d4c4a978d600beccfa7850c23ecf

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • Adds policy Run key to start application

    • Downloads MZ/PE file

    • Windows security modification

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Program crash

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

6
T1112

Discovery

System Information Discovery

1
T1082

Collection

Email Collection

1
T1114

Tasks