MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 857e88abbcf84ed98d208749da6457a7858176656f7ed4916adf355794e67fec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XpertRAT


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 2 File information Comments

SHA256 hash: 857e88abbcf84ed98d208749da6457a7858176656f7ed4916adf355794e67fec
SHA3-384 hash: 6983bad5ea0fd23f1e95e7e216e63140b8975abc9037dc32fe6ab0edde7cfb22bf8ef5764124e12a95367c7e0ffc03d8
SHA1 hash: d43d9a8cd8c8ab443a8567e8e467f58395b9c307
MD5 hash: 0fba4fe17da6f869210904e2b613a95e
humanhash: asparagus-crazy-fifteen-early
File name:0fba4fe17da6f869210904e2b613a95e.exe
Download: download sample
Signature XpertRAT
File size:390'144 bytes
First seen:2022-01-22 20:06:25 UTC
Last seen:2022-01-22 21:49:25 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'481 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 6144:Igfey1Xs+i68+gv1geuaddfUtu7ZgNPJTBjWuqFC/Bc2OvttYK1YGSoOhpRRRRRP:Igfpi687v6ezdBUE7g8uqFwQv3f7kRRy
TLSH T10384123903FCF35BC5BE47B9F8A1008853B1D617B351E38B5B92A56D0D633C18E169A2
Reporter abuse_ch
Tags:exe XpertRAT


Avatar
abuse_ch
XpertRAT C2:
62.197.136.115:6512

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
62.197.136.115:6512 https://threatfox.abuse.ch/ioc/313582/

Intelligence


File Origin
# of uploads :
2
# of downloads :
381
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0fba4fe17da6f869210904e2b613a95e.exe
Verdict:
Malicious activity
Analysis date:
2022-01-22 22:45:45 UTC
Tags:
trojan rat xpertrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
DNS request
Using the Windows Management Instrumentation requests
Creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed racealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
MailPassView XpertRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Detected unpacking (creates a PE file in dynamic memory)
Disables UAC (registry)
Disables user account control notifications
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Generic Dropper
Yara detected MailPassView
Yara detected WebBrowserPassView password recovery tool
Yara detected XpertRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 558201 Sample: jhGmkMvrd6.exe Startdate: 22/01/2022 Architecture: WINDOWS Score: 100 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 Multi AV Scanner detection for submitted file 2->53 55 8 other signatures 2->55 9 jhGmkMvrd6.exe 3 2->9         started        13 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 3 2->13         started        15 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 2 2->15         started        17 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 2 2->17         started        process3 file4 43 C:\Users\user\AppData\...\jhGmkMvrd6.exe.log, ASCII 9->43 dropped 65 Detected unpacking (creates a PE file in dynamic memory) 9->65 67 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 9->67 19 jhGmkMvrd6.exe 1 1 9->19         started        69 Multi AV Scanner detection for dropped file 13->69 22 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 1 13->22         started        24 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 1 15->24         started        26 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe 17->26         started        signatures5 process6 signatures7 57 Changes security center settings (notifications, updates, antivirus, firewall) 19->57 59 Disables user account control notifications 19->59 61 Writes to foreign memory regions 19->61 63 3 other signatures 19->63 28 iexplore.exe 3 9 19->28         started        process8 dnsIp9 47 hgtrading.ydns.eu 62.197.136.115, 49745, 49746, 49747 SPRINTLINKUS Netherlands 28->47 45 I4G3L113-M7Y0-X0M5-M3D5-U8C7U551Q8Q7.exe, PE32 28->45 dropped 71 Creates an undocumented autostart registry key 28->71 73 Creates autostart registry keys with suspicious names 28->73 33 iexplore.exe 28->33         started        35 iexplore.exe 2 28->35         started        37 iexplore.exe 1 28->37         started        39 3 other processes 28->39 file10 signatures11 process12 process13 41 WerFault.exe 33->41         started       
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-01-22 15:16:12 UTC
File Type:
PE (.Net Exe)
Extracted files:
15
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
xpertrat
Score:
  10/10
Tags:
family:xpertrat collection evasion persistence rat trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System policy modification
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Checks whether UAC is enabled
Maps connected drives based on registry
Checks BIOS information in registry
Windows security modification
Adds policy Run key to start application
Looks for VMWare Tools registry key
Looks for VirtualBox Guest Additions in registry
UAC bypass
Windows security bypass
XpertRAT
Unpacked files
SH256 hash:
e46fbc1a67765c05f1640d79901900679e962dd4f6087bcb849177b5fe6846be
MD5 hash:
1f5ea7e4e763ec8d9a0580f9fd637594
SHA1 hash:
e880db52473ddc34903792cd77705307be785d55
SH256 hash:
06520a69538d70af2ec1cb5ab02a7c45cdca0f10d31d153f19abad98fad63762
MD5 hash:
08248dfed05745a417ba00e9967d4718
SHA1 hash:
1b0a7122d71db352d11a81729aba0fcfae4df834
Detections:
win_xpertrat_a0 win_xpertrat_auto
SH256 hash:
24bae02056abde6d68745b4b9ecbc3693c4d9685db5921a18f87ef029d60a2cc
MD5 hash:
2e1342e640ba1f94f986b1043fa176e1
SHA1 hash:
f265f005125335cd2d71e055dcde58fa8ff4150e
SH256 hash:
70028e22c06e64a3c24f307aefd10678ac3db9e4b8091c690f23176443c921f5
MD5 hash:
9426153840a5e46841a0d0b3f57979be
SHA1 hash:
0d9a532e8b8e01ac73c0de9bbf640e02b11edbed
SH256 hash:
857e88abbcf84ed98d208749da6457a7858176656f7ed4916adf355794e67fec
MD5 hash:
0fba4fe17da6f869210904e2b613a95e
SHA1 hash:
d43d9a8cd8c8ab443a8567e8e467f58395b9c307
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments