MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8963180e8b2e7e51c5abd716e7a562ad010f663c41a38015ad2566231a7da9af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XpertRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 8963180e8b2e7e51c5abd716e7a562ad010f663c41a38015ad2566231a7da9af
SHA3-384 hash: c80bd05f65d5865cf21a4e39310f33c55fd6d20e792789df6f8edd2e571555ff950bc11c4373a50e23d8e75cfe2216b2
SHA1 hash: 1f34df7a5cd551dcb5ec24227fbd1a985cbbe4ef
MD5 hash: ed21990ff9e29addfd9252f1ba0b30d4
humanhash: lamp-carpet-cat-paris
File name:11_07_2020 PO_INVOICE #3309247.exe
Download: download sample
Signature XpertRAT
File size:176'128 bytes
First seen:2020-10-15 11:57:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a5db5a466a58a88fc36a0259818100cd (6 x XpertRAT)
ssdeep 3072:HNWDBPN3piuacphBR3K4aoFQyiF2kK8np4RqDHCp7B+/R:HIB13piuacD33KuQha4pDDHCp7e
Threatray 390 similar samples on MalwareBazaar
TLSH 3904E12ABD570043F01C1D3096C686E91B7E7C5B7687272FEF5417A95FA2A240982FB3
Reporter abuse_ch
Tags:exe RAT XpertRAT


Avatar
abuse_ch
Malspam distributing XpertRAT:

HELO: gmail.com
Sending IP: 156.96.47.42
From: ACCOUNT PROCUREMENT <mitul1.timurnetwork@gmail.com>
Subject: RE: 11_07_2020 PO_INVOICE #3309247 (REVISED)
Attachment: 11_07_2020 PO_INVOICE 3309247.zip (contains "11_07_2020 PO_INVOICE #3309247.exe")

XpertRAT C2:
sandshoe.myfirewall.org:4000 (156.96.47.42)

Intelligence


File Origin
# of uploads :
1
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Launching a process
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Creating a file in the %temp% directory
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Deleting a recently created file
Launching the default Windows debugger (dwwin.exe)
Blocking the User Account Control
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Enabling autorun
Result
Threat name:
XpertRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Changes security center settings (notifications, updates, antivirus, firewall)
Disables user account control notifications
Executable has a suspicious name (potential lure to open the executable)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Yara detected Generic Dropper
Yara detected XpertRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 298649 Sample: 11_07_2020 PO_INVOICE #3309... Startdate: 15/10/2020 Architecture: WINDOWS Score: 100 35 Malicious sample detected (through community Yara rule) 2->35 37 Antivirus / Scanner detection for submitted sample 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 5 other signatures 2->41 7 11_07_2020 PO_INVOICE #3309247.exe 1 1 2->7         started        process3 signatures4 43 Changes security center settings (notifications, updates, antivirus, firewall) 7->43 45 Disables user account control notifications 7->45 47 Sample uses process hollowing technique 7->47 10 iexplore.exe 7->10         started        12 iexplore.exe 7->12         started        14 iexplore.exe 7->14         started        16 8 other processes 7->16 process5 process6 18 WerFault.exe 11 10->18         started        21 WerFault.exe 23 11 12->21         started        23 WerFault.exe 2 11 14->23         started        25 WerFault.exe 11 16->25         started        27 WerFault.exe 11 16->27         started        29 WerFault.exe 11 16->29         started        31 3 other processes 16->31 dnsIp7 33 192.168.2.1 unknown unknown 18->33
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-10-14 23:22:54 UTC
AV detection:
28 of 29 (96.55%)
Threat level:
  5/5
Result
Malware family:
xpertrat
Score:
  10/10
Tags:
upx evasion trojan persistence rat family:xpertrat spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System policy modification
Suspicious use of SetThreadContext
Adds Run key to start application
Checks whether UAC is enabled
Program crash
Reads user/profile data of web browsers
Windows security modification
Adds policy Run key to start application
UPX packed file
UAC bypass
Windows security bypass
XpertRAT
XpertRAT Core Payload
Unpacked files
SH256 hash:
8963180e8b2e7e51c5abd716e7a562ad010f663c41a38015ad2566231a7da9af
MD5 hash:
ed21990ff9e29addfd9252f1ba0b30d4
SHA1 hash:
1f34df7a5cd551dcb5ec24227fbd1a985cbbe4ef
SH256 hash:
101dd4b25e9989615127c1175fc54c5f675bb734902b2d770e249eebfb6312b5
MD5 hash:
5eab4d4863af65365434285be882fb8c
SHA1 hash:
e1d54912824d900a1890821f79025d1e3adcc5ae
Detections:
win_xpertrat_a0 win_xpertrat_auto
SH256 hash:
4f9febd65cb2fefa1ebca76372e8cf8240d72a312d5b6e294e17e6c0bcb7358e
MD5 hash:
e8b19cabd549382389ff98f865d297b4
SHA1 hash:
3a93044a6a92fc0d35aa7ce6436f9ab42d70c96c
Detections:
win_xpertrat_a0 win_xpertrat_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:win_xpertrat_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

XpertRAT

Executable exe 8963180e8b2e7e51c5abd716e7a562ad010f663c41a38015ad2566231a7da9af

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments