General

  • Target

    nuevo pedido#23785.exe

  • Size

    430KB

  • Sample

    220124-m849jaedb8

  • MD5

    45fe143aec6a446a2bfec96054dc923c

  • SHA1

    a00719ef783406b10e44962ee6869e6a6fcc9e0d

  • SHA256

    71cd3e3afcd5a2df4cc2092f8724b24c6a8cc7e6f44f77cc8174dac0a565f98b

  • SHA512

    97967ad8de22d724541b985e0beb9ac68a5bfd2884df5d408fca79318dd9259e801dcfbddaacaf34bdc25128a1a00af78230bf818ce5c24b1ae3b18c545e540b

Malware Config

Targets

    • Target

      nuevo pedido#23785.exe

    • Size

      430KB

    • MD5

      45fe143aec6a446a2bfec96054dc923c

    • SHA1

      a00719ef783406b10e44962ee6869e6a6fcc9e0d

    • SHA256

      71cd3e3afcd5a2df4cc2092f8724b24c6a8cc7e6f44f77cc8174dac0a565f98b

    • SHA512

      97967ad8de22d724541b985e0beb9ac68a5bfd2884df5d408fca79318dd9259e801dcfbddaacaf34bdc25128a1a00af78230bf818ce5c24b1ae3b18c545e540b

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • Looks for VirtualBox Guest Additions in registry

    • Adds policy Run key to start application

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Windows security modification

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Program crash

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks