General

  • Target

    54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422

  • Size

    728KB

  • Sample

    220725-vxethaccaj

  • MD5

    cf5eaf5016b20b65c805de7e5e074a85

  • SHA1

    1b89c182e8421d1b28feec2308cfbb1ce455dd79

  • SHA256

    54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422

  • SHA512

    b3a6cb9d8d686ea1f4ce312ef6f0269cee5fa3df1eb773f672ff2aa2da6c6a0e1b40acedaa8e3fd1fb723304f0e61455886872fb0622368b64cc5a4e98d03158

Malware Config

Targets

    • Target

      54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422

    • Size

      728KB

    • MD5

      cf5eaf5016b20b65c805de7e5e074a85

    • SHA1

      1b89c182e8421d1b28feec2308cfbb1ce455dd79

    • SHA256

      54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422

    • SHA512

      b3a6cb9d8d686ea1f4ce312ef6f0269cee5fa3df1eb773f672ff2aa2da6c6a0e1b40acedaa8e3fd1fb723304f0e61455886872fb0622368b64cc5a4e98d03158

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

7
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks