MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cb7dedb5b84e8fbec0ddbbdf1c7226bdc3a132644c4e509feda1affc5f6b1c6a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XpertRAT


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: cb7dedb5b84e8fbec0ddbbdf1c7226bdc3a132644c4e509feda1affc5f6b1c6a
SHA3-384 hash: e3cc853a02610d6da0fc7c9e11f63927719e98e57b0c4c553d43b97c648b56dd19e58525460966a952372566b33e94f2
SHA1 hash: 1f1c014220f6d5f52589731c94171cd1da22cea1
MD5 hash: 0fd0f896847b157fa8953d561278b61e
humanhash: cold-mirror-wolfram-high
File name:02 SCRAP BIDDING INVITATION_xlsx.gz
Download: download sample
Signature XpertRAT
File size:265'452 bytes
First seen:2020-06-17 05:44:50 UTC
Last seen:Never
File type: gz
MIME type:application/gzip
ssdeep 6144:FmFr9DSB3s3AAE4fn+YjIlMZCLTy2jkSkON+7byVOe:FmF9ccff+62bO7byVOe
TLSH 1744238E5C16E59E48F5AA3F968401A8F3B1862C3BD8A61C7351FE8C2CD78147637ED4
Reporter abuse_ch
Tags:gz nVpn RAT XpertRAT


Avatar
abuse_ch
Malspam distributing XpertRAT:

HELO: vps.grupoescala.com
Sending IP: 82.223.18.162
From: PINAR DELIHASANOGLU <pinar.elihasanoglu@poscoassan.com>
Subject: Posco Assan TST JUNE Steel PipeTender Invitation ( Due Date: 27 july 12:00 )
Attachment: 02 SCRAP BIDDING INVITATION_xlsx.gz (contains "02 SCRAP BIDDING INVITATION_xlsx.exe")

XpertRAT C2:
79.134.225.85:3135

Hosted on nVpn:

% Information related to '79.134.225.64 - 79.134.225.127'

% Abuse contact for '79.134.225.64 - 79.134.225.127' is 'abuse@your-vpn.network'

inetnum: 79.134.225.64 - 79.134.225.127
netname: YOUR_VPN_NETWORK
country: DE
remarks: ****************************************************
remarks: This subnet belongs to a VPN service provider.
remarks: We protect the right to privacy, which means
remarks: we don't log the activities of our users.
remarks: ****************************************************
admin-c: EH4074-RIPE
tech-c: YVN10-RIPE
status: ASSIGNED PA
abuse-c: YVN10-RIPE
org: ORG-YVN1-RIPE
mnt-by: AF15-MNT
created: 2019-07-19T18:26:38Z
last-modified: 2019-07-19T18:51:28Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-06-17 05:46:06 UTC
AV detection:
28 of 48 (58.33%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

XpertRAT

gz cb7dedb5b84e8fbec0ddbbdf1c7226bdc3a132644c4e509feda1affc5f6b1c6a

(this sample)

  
Dropping
XpertRAT
  
Delivery method
Distributed via e-mail attachment

Comments