General

  • Target

    RFQ- SPECIFI-PE0008234.pdf(89kb).exe

  • Size

    391KB

  • Sample

    220210-myek5aghgm

  • MD5

    764b623961a0d9575de514979d3173ba

  • SHA1

    6803599f25f3a13860d26b106df36ded15fb7aac

  • SHA256

    40dbb91cfe13864e0e650527e0b28bd288533adc1a82ebb1b96c99b2c32c78ff

  • SHA512

    d5f6357ebae30bbfdb8f9a6b2dc83168dcc776ca718a4b4dcac0cd3dc040cdab70d1f65944351a691b8a43a3f5f5be2385e9c74bfa869e9a9c5133554a45a02c

Malware Config

Targets

    • Target

      RFQ- SPECIFI-PE0008234.pdf(89kb).exe

    • Size

      391KB

    • MD5

      764b623961a0d9575de514979d3173ba

    • SHA1

      6803599f25f3a13860d26b106df36ded15fb7aac

    • SHA256

      40dbb91cfe13864e0e650527e0b28bd288533adc1a82ebb1b96c99b2c32c78ff

    • SHA512

      d5f6357ebae30bbfdb8f9a6b2dc83168dcc776ca718a4b4dcac0cd3dc040cdab70d1f65944351a691b8a43a3f5f5be2385e9c74bfa869e9a9c5133554a45a02c

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Program crash

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks