General

  • Target

    efa98ba251a3da83fa3443007da3f63ee7bec8000bfa20baa45a3be561e8327f

  • Size

    1.2MB

  • Sample

    220731-hhmvcaeaek

  • MD5

    f241c791a6545537abcd28bc8392971c

  • SHA1

    c53d8eaabbafc5bb990242fb97bb3cc4fe30e8ad

  • SHA256

    efa98ba251a3da83fa3443007da3f63ee7bec8000bfa20baa45a3be561e8327f

  • SHA512

    7c2ce6250b89e8d71f0e795bba67ceb5e8b1034e33365dc9546e8187725cdb236eee788ee544d54261a696a408827d65b2fa38d52625c6795eac02b755503fe3

Malware Config

Targets

    • Target

      efa98ba251a3da83fa3443007da3f63ee7bec8000bfa20baa45a3be561e8327f

    • Size

      1.2MB

    • MD5

      f241c791a6545537abcd28bc8392971c

    • SHA1

      c53d8eaabbafc5bb990242fb97bb3cc4fe30e8ad

    • SHA256

      efa98ba251a3da83fa3443007da3f63ee7bec8000bfa20baa45a3be561e8327f

    • SHA512

      7c2ce6250b89e8d71f0e795bba67ceb5e8b1034e33365dc9546e8187725cdb236eee788ee544d54261a696a408827d65b2fa38d52625c6795eac02b755503fe3

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks