General

  • Target

    7560b03d9721036181565287e85d9525_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240401-vfw2fsae59

  • MD5

    7560b03d9721036181565287e85d9525

  • SHA1

    447c0d915c9236b5f3221bfbe05e5b57785d3142

  • SHA256

    f2926aaea4603961e15c9ac92eb599ddd51bd6e19bd7fded285a1db16753db87

  • SHA512

    fb38977856b6d4702b1793916c90b0b595dc8881457d6a2a98ba488f80e444314a5e1cdaa0f6a741e6c12b129195fd04f499d84a4cca32386c64fe58ccdfe583

  • SSDEEP

    24576:wLFftZPKgfM82jk4sM7RPPzN6dK3KEf02oaSzFEvtOA:QZPK3DkktYw3ttyzF2tf

Malware Config

Extracted

Family

xpertrat

Version

3.0.10

Botnet

Test

C2

kapasky-antivirus.firewall-gateway.net:4000

Mutex

L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0

Targets

    • Target

      7560b03d9721036181565287e85d9525_JaffaCakes118

    • Size

      1.1MB

    • MD5

      7560b03d9721036181565287e85d9525

    • SHA1

      447c0d915c9236b5f3221bfbe05e5b57785d3142

    • SHA256

      f2926aaea4603961e15c9ac92eb599ddd51bd6e19bd7fded285a1db16753db87

    • SHA512

      fb38977856b6d4702b1793916c90b0b595dc8881457d6a2a98ba488f80e444314a5e1cdaa0f6a741e6c12b129195fd04f499d84a4cca32386c64fe58ccdfe583

    • SSDEEP

      24576:wLFftZPKgfM82jk4sM7RPPzN6dK3KEf02oaSzFEvtOA:QZPK3DkktYw3ttyzF2tf

    • Detect ZGRat V1

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • XpertRAT Core payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Adds policy Run key to start application

    • Deletes itself

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks