MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4c57fb95b67660646d6e37a04eb78e010c6a629e1fd8590aaeb4093dea0fad1f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XpertRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 4c57fb95b67660646d6e37a04eb78e010c6a629e1fd8590aaeb4093dea0fad1f
SHA3-384 hash: 9965e4a640b9bac1e36a911a70bea05fa040555c53aaa7db69abde7b20d98cf770a91c1e2ae8d42001ba327de2781188
SHA1 hash: f97cc4ecc429d57d44674511d518f9e6b428e7b3
MD5 hash: 7236e64dc6eb9e21ae4c16239820713f
humanhash: pluto-twelve-autumn-lima
File name:orden pendiente #3422.exe
Download: download sample
Signature XpertRAT
File size:391'680 bytes
First seen:2022-01-20 07:28:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 6144:kwADTLF3wGGtaEzMjvnkRUcb/YZqGJHyx7txcfez7bEfS8zprR/zGS7B:ArW9taEzIndcb8qGJ4gfenKScrRG2B
Threatray 6'504 similar samples on MalwareBazaar
TLSH T15A8402107BFE2769EBEA87F876319050937539573163D62C4D4960DE28B2F828782B37
Reporter lowmal3
Tags:exe XpertRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
170
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Using the Windows Management Instrumentation requests
Creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated packed print.exe update.exe
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
MailPassView XpertRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Changes security center settings (notifications, updates, antivirus, firewall)
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Detected unpacking (creates a PE file in dynamic memory)
Disables user account control notifications
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected Generic Dropper
Yara detected MailPassView
Yara detected WebBrowserPassView password recovery tool
Yara detected XpertRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 556551 Sample: orden pendiente #3422.exe Startdate: 20/01/2022 Architecture: WINDOWS Score: 100 68 Malicious sample detected (through community Yara rule) 2->68 70 Multi AV Scanner detection for submitted file 2->70 72 Detected unpacking (creates a PE file in dynamic memory) 2->72 74 9 other signatures 2->74 9 orden pendiente #3422.exe 3 2->9         started        13 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 3 2->13         started        15 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 2 2->15         started        17 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 2->17         started        process3 file4 62 C:\Users\...\orden pendiente #3422.exe.log, ASCII 9->62 dropped 84 Injects a PE file into a foreign processes 9->84 19 orden pendiente #3422.exe 1 1 9->19         started        22 orden pendiente #3422.exe 9->22         started        86 Multi AV Scanner detection for dropped file 13->86 88 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 13->88 90 Machine Learning detection for dropped file 13->90 24 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 1 13->24         started        26 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 13->26         started        28 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 15->28         started        30 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 17->30         started        signatures5 process6 signatures7 80 Changes security center settings (notifications, updates, antivirus, firewall) 19->80 82 Disables user account control notifications 19->82 32 iexplore.exe 3 8 19->32         started        37 iexplore.exe 19->37         started        39 iexplore.exe 19->39         started        process8 dnsIp9 64 hgtrading.ydns.eu 62.197.136.115, 49751, 49752, 49753 SPRINTLINKUS Netherlands 32->64 58 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe, PE32 32->58 dropped 60 C:\...\I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7, data 32->60 dropped 76 Creates an undocumented autostart registry key 32->76 78 Creates autostart registry keys with suspicious names 32->78 41 iexplore.exe 2 32->41         started        44 iexplore.exe 32->44         started        46 iexplore.exe 32->46         started        52 4 other processes 32->52 48 WerFault.exe 37->48         started        50 WerFault.exe 39->50         started        file10 signatures11 process12 dnsIp13 66 192.168.2.1 unknown unknown 41->66 54 WerFault.exe 44->54         started        56 WerFault.exe 46->56         started        process14
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-01-20 07:29:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
21
AV detection:
18 of 27 (66.67%)
Threat level:
  5/5
Result
Malware family:
xpertrat
Score:
  10/10
Tags:
family:xpertrat collection evasion persistence rat trojan
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System policy modification
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Checks whether UAC is enabled
Maps connected drives based on registry
Checks BIOS information in registry
Windows security modification
Adds policy Run key to start application
Looks for VMWare Tools registry key
Sets service image path in registry
Looks for VirtualBox Guest Additions in registry
UAC bypass
Windows security bypass
XpertRAT
Unpacked files
SH256 hash:
06520a69538d70af2ec1cb5ab02a7c45cdca0f10d31d153f19abad98fad63762
MD5 hash:
08248dfed05745a417ba00e9967d4718
SHA1 hash:
1b0a7122d71db352d11a81729aba0fcfae4df834
Detections:
win_xpertrat_a0 win_xpertrat_auto
SH256 hash:
41e3aee5f37fa00cd78f6c061b2444956762af6c1926b5698e5d599bf2c62dd3
MD5 hash:
476bd9275ab8d6226adcb825db9f428f
SHA1 hash:
8c068f9bf9c7bc73332c176b2e9e629eed2c8852
SH256 hash:
6f5048dfde8fd8af8e93d8b7cb5b2ddeb90fae6cd05b481948dc15c4853a7679
MD5 hash:
e0ff519612279ae22db0761ff14f2c51
SHA1 hash:
7b19c46e4a4f1e3968a8b4e9c6aa171beabf6482
SH256 hash:
8b25188a1581753b0faa89a7e371d2cc852fd95635b8503b6b20a4263af486e8
MD5 hash:
384cab014157440d3c462a97689e40ff
SHA1 hash:
4b91e7dfd574e04db14d2e3223df9327a5b95ba2
SH256 hash:
4c57fb95b67660646d6e37a04eb78e010c6a629e1fd8590aaeb4093dea0fad1f
MD5 hash:
7236e64dc6eb9e21ae4c16239820713f
SHA1 hash:
f97cc4ecc429d57d44674511d518f9e6b428e7b3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

XpertRAT

Executable exe 4c57fb95b67660646d6e37a04eb78e010c6a629e1fd8590aaeb4093dea0fad1f

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments