General
-
Target
920a84f8fce7b1b7bed3e1c7dfed6ace_JaffaCakes118
-
Size
931KB
-
Sample
240813-hrkfkszbkh
-
MD5
920a84f8fce7b1b7bed3e1c7dfed6ace
-
SHA1
62ec70792894b003aa5ad208b576a2e182f0d3f0
-
SHA256
a36735377d731d16330587a190a99acbd5a1d9556e066d771268f8b4b6cd3821
-
SHA512
f2da84c7e5f0154d45b7db2077b3bc514d6bf5d9de41888ba0469ceeb545c01455730d45144e07daabeb789ee85ca7978a55ac18cd57cfc2771204b58bb5aed2
-
SSDEEP
12288:LR94nvMreRXa/yla6Uqm+o/kDrzlqGZQ+3ocujQNIqWiLpYruy5g1aj9/RdLIT5C:LR9eRXa/Sa6Uq0/kDrzRb26nnjqKoeK
Static task
static1
Behavioral task
behavioral1
Sample
920a84f8fce7b1b7bed3e1c7dfed6ace_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
xpertrat
3.0.10
xbox
91.193.75.200:4726
79.134.225.97:4726
P4U8N5X3-N0E7-P7T5-M113-K7R6K4S0G6G6
Targets
-
-
Target
920a84f8fce7b1b7bed3e1c7dfed6ace_JaffaCakes118
-
Size
931KB
-
MD5
920a84f8fce7b1b7bed3e1c7dfed6ace
-
SHA1
62ec70792894b003aa5ad208b576a2e182f0d3f0
-
SHA256
a36735377d731d16330587a190a99acbd5a1d9556e066d771268f8b4b6cd3821
-
SHA512
f2da84c7e5f0154d45b7db2077b3bc514d6bf5d9de41888ba0469ceeb545c01455730d45144e07daabeb789ee85ca7978a55ac18cd57cfc2771204b58bb5aed2
-
SSDEEP
12288:LR94nvMreRXa/yla6Uqm+o/kDrzlqGZQ+3ocujQNIqWiLpYruy5g1aj9/RdLIT5C:LR9eRXa/Sa6Uq0/kDrzRb26nnjqKoeK
-
XpertRAT Core payload
-
Adds policy Run key to start application
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify Tools
4Modify Registry
7