MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 149e45d691c1504ee820a8e8473be7d2eeb6eb840cb372052b2187b7dd4d34d2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XpertRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 149e45d691c1504ee820a8e8473be7d2eeb6eb840cb372052b2187b7dd4d34d2
SHA3-384 hash: 6c173f37cd8ec85172f690cf3ee1b8b363206ff4e1c6d101b59bee84e22200e3ba0c43b313c0040011de929086e7843d
SHA1 hash: 4ce7335a50be158c2e8999886693d7624173cdd4
MD5 hash: e3c758010d10affd0f2bbb8544f01026
humanhash: grey-september-zulu-four
File name:새로운 주문.exe
Download: download sample
Signature XpertRAT
File size:823'296 bytes
First seen:2022-01-25 04:15:31 UTC
Last seen:2022-01-25 06:08:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:lezWoYD8MIyWIB/SPLnbMi/bdaUPbwYQQ0sxyYY7xd+aE8yGxz8ax/oYEVJ:UdYD8M/WlL/bOHsIYK+aE8yOf
Threatray 887 similar samples on MalwareBazaar
TLSH T17205F127769DDA21C32817BB40DF801807797B46AA63D30A7FCA73AE1F117935E8815B
File icon (PE):PE icon
dhash icon 136d455d6d4d550b (25 x AgentTesla, 9 x Formbook, 5 x Loki)
Reporter Anonymous
Tags:exe XpertRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
187
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Using the Windows Management Instrumentation requests
Creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe obfuscated packed replace.exe update.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
XpertRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Detected unpacking (creates a PE file in dynamic memory)
Disables user account control notifications
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected Generic Dropper
Yara detected XpertRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 559224 Sample: #Uc0c8#Ub85c#Uc6b4 #Uc8fc#U... Startdate: 25/01/2022 Architecture: WINDOWS Score: 100 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 9 other signatures 2->49 7 #Uc0c8#Ub85c#Uc6b4 #Uc8fc#Ubb38.exe 3 2->7         started        11 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 3 2->11         started        13 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 2 2->13         started        15 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 2 2->15         started        process3 file4 31 #Uc0c8#Ub85c#Uc6b4 #Uc8fc#Ubb38.exe.log, ASCII 7->31 dropped 51 Injects a PE file into a foreign processes 7->51 17 #Uc0c8#Ub85c#Uc6b4 #Uc8fc#Ubb38.exe 1 1 7->17         started        53 Multi AV Scanner detection for dropped file 11->53 55 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 11->55 57 Machine Learning detection for dropped file 11->57 20 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 1 11->20         started        22 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 1 13->22         started        24 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 15->24         started        signatures5 process6 signatures7 39 Changes security center settings (notifications, updates, antivirus, firewall) 17->39 41 Disables user account control notifications 17->41 26 iexplore.exe 3 9 17->26         started        process8 dnsIp9 37 hgtrading.ydns.eu 62.197.136.115, 49733, 49734, 49735 SPRINTLINKUS Netherlands 26->37 33 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe, PE32 26->33 dropped 35 C:\...\I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7, data 26->35 dropped 59 Creates an undocumented autostart registry key 26->59 61 Creates autostart registry keys with suspicious names 26->61 file10 signatures11
Threat name:
ByteCode-MSIL.Trojan.Scarsi
Status:
Malicious
First seen:
2022-01-25 04:16:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
14
AV detection:
15 of 43 (34.88%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
evasion
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Maps connected drives based on registry
Checks BIOS information in registry
Looks for VMWare Tools registry key
Looks for VirtualBox Guest Additions in registry
Unpacked files
SH256 hash:
06520a69538d70af2ec1cb5ab02a7c45cdca0f10d31d153f19abad98fad63762
MD5 hash:
08248dfed05745a417ba00e9967d4718
SHA1 hash:
1b0a7122d71db352d11a81729aba0fcfae4df834
Detections:
win_xpertrat_a0 win_xpertrat_auto
SH256 hash:
41e3aee5f37fa00cd78f6c061b2444956762af6c1926b5698e5d599bf2c62dd3
MD5 hash:
476bd9275ab8d6226adcb825db9f428f
SHA1 hash:
8c068f9bf9c7bc73332c176b2e9e629eed2c8852
SH256 hash:
8325a5cf7942bb46ac528c836b79180c05d71a4e7de108693d303d56bcc5def1
MD5 hash:
efdf2c54a74297c24bc73285376c432b
SHA1 hash:
564f25afb6c5599cdcd5fafaff32c1475e581af4
SH256 hash:
c838096781787486bf9a51d53a3aa80083dcb46b165aaa27b3ee73c21dbe9ed1
MD5 hash:
eada62f2cb6bd1bb0cbbdf3d906d0b6c
SHA1 hash:
5276a2f07af84ea97bd4679b4d5e64f49de72534
SH256 hash:
e3425ec8c112f58eb2abc5409cf459116952b0e8937ac2c1ce210d58be0f9a4d
MD5 hash:
ed1f2ed84bb88328e805778b1e616c9c
SHA1 hash:
d07cf08cdf3f1770685260ab5659a9c0ee9a3370
Detections:
win_xpertrat_a0 win_xpertrat_auto
SH256 hash:
149e45d691c1504ee820a8e8473be7d2eeb6eb840cb372052b2187b7dd4d34d2
MD5 hash:
e3c758010d10affd0f2bbb8544f01026
SHA1 hash:
4ce7335a50be158c2e8999886693d7624173cdd4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments