SYMBOLCOMMON_NAMEaka. SYNONYMS
win.xpertrat (Back to overview)

XpertRAT


There is no description at this point.

References
2021-04-21TalosVanja Svajcer
@online{svajcer:20210421:year:4741c8e, author = {Vanja Svajcer}, title = {{A year of Fajan evolution and Bloomberg themed campaigns}}, date = {2021-04-21}, organization = {Talos}, url = {https://blog.talosintelligence.com/2021/04/a-year-of-fajan-evolution-and-bloomberg.html}, language = {English}, urldate = {2021-04-28} } A year of Fajan evolution and Bloomberg themed campaigns
MASS Logger Nanocore RAT NetWire RC Revenge RAT XpertRAT
2018-12-18K7 SecurityLokesh J
@online{j:20181218:scumbag:720cb3c, author = {Lokesh J}, title = {{Scumbag Combo: Agent Tesla and XpertRAT}}, date = {2018-12-18}, organization = {K7 Security}, url = {https://labs.k7computing.com/?p=15672}, language = {English}, urldate = {2020-01-06} } Scumbag Combo: Agent Tesla and XpertRAT
XpertRAT
2018-03-12Veronica Valeros' BlogVeronica Valeros
@online{valeros:20180312:study:73a8b6b, author = {Veronica Valeros}, title = {{A Study of RATs: Third Timeline Iteration}}, date = {2018-03-12}, organization = {Veronica Valeros' Blog}, url = {https://www.veronicavaleros.com/blog/2018/3/12/a-study-of-rats-third-timeline-iteration}, language = {English}, urldate = {2020-01-10} } A Study of RATs: Third Timeline Iteration
XpertRAT
Yara Rules
[TLP:WHITE] win_xpertrat_auto (20220516 | Detects win.xpertrat.)
rule win_xpertrat_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-05-16"
        version = "1"
        description = "Detects win.xpertrat."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.xpertrat"
        malpedia_rule_date = "20220513"
        malpedia_hash = "7f4b2229e6ae614d86d74917f6d5b41890e62a26"
        malpedia_version = "20220516"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 007168 ff0468 ff0a 250004003c }
            // n = 4, score = 200
            //   007168               | add                 byte ptr [ecx + 0x68], dh
            //   ff0468               | inc                 dword ptr [eax + ebp*2]
            //   ff0a                 | dec                 dword ptr [edx]
            //   250004003c           | and                 eax, 0x3c000400

        $sequence_1 = { 0808 008a3800cc1c 5e 006c70ff 0808 008f38001b26 }
            // n = 6, score = 200
            //   0808                 | or                  byte ptr [eax], cl
            //   008a3800cc1c         | add                 byte ptr [edx + 0x1ccc0038], cl
            //   5e                   | pop                 esi
            //   006c70ff             | add                 byte ptr [eax + esi*2 - 1], ch
            //   0808                 | or                  byte ptr [eax], cl
            //   008f38001b26         | add                 byte ptr [edi + 0x261b0038], cl

        $sequence_2 = { 250004003c 6c 70ff 0808 008a3800cc1c 5e }
            // n = 6, score = 200
            //   250004003c           | and                 eax, 0x3c000400
            //   6c                   | insb                byte ptr es:[edi], dx
            //   70ff                 | jo                  1
            //   0808                 | or                  byte ptr [eax], cl
            //   008a3800cc1c         | add                 byte ptr [edx + 0x1ccc0038], cl
            //   5e                   | pop                 esi

        $sequence_3 = { 0000 00a1cc004400 0bc0 7402 ffe0 }
            // n = 5, score = 200
            //   0000                 | add                 byte ptr [eax], al
            //   00a1cc004400         | add                 byte ptr [ecx + 0x4400cc], ah
            //   0bc0                 | or                  eax, eax
            //   7402                 | je                  4
            //   ffe0                 | jmp                 eax

        $sequence_4 = { 006c70ff 0808 008f38001b26 001b 0d002a2364 ff08 0800 }
            // n = 7, score = 200
            //   006c70ff             | add                 byte ptr [eax + esi*2 - 1], ch
            //   0808                 | or                  byte ptr [eax], cl
            //   008f38001b26         | add                 byte ptr [edi + 0x261b0038], cl
            //   001b                 | add                 byte ptr [ebx], bl
            //   0d002a2364           | or                  eax, 0x64232a00
            //   ff08                 | dec                 dword ptr [eax]
            //   0800                 | or                  byte ptr [eax], al

        $sequence_5 = { 0430 ff0a 4c 000c00 }
            // n = 4, score = 200
            //   0430                 | add                 al, 0x30
            //   ff0a                 | dec                 dword ptr [edx]
            //   4c                   | dec                 esp
            //   000c00               | add                 byte ptr [eax + eax], cl

        $sequence_6 = { 0d80000700 0474 ff0478 ff05???????? 000d???????? 0878ff 0d98000700 }
            // n = 7, score = 200
            //   0d80000700           | or                  eax, 0x70080
            //   0474                 | add                 al, 0x74
            //   ff0478               | inc                 dword ptr [eax + edi*2]
            //   ff05????????         |                     
            //   000d????????         |                     
            //   0878ff               | or                  byte ptr [eax - 1], bh
            //   0d98000700           | or                  eax, 0x70098

        $sequence_7 = { 0878ff 0d98000700 6e 74ff }
            // n = 4, score = 200
            //   0878ff               | or                  byte ptr [eax - 1], bh
            //   0d98000700           | or                  eax, 0x70098
            //   6e                   | outsb               dx, byte ptr [esi]
            //   74ff                 | je                  1

        $sequence_8 = { eb0c ff15???????? 8b8d1cfdffff 8b490c }
            // n = 4, score = 100
            //   eb0c                 | jmp                 0xe
            //   ff15????????         |                     
            //   8b8d1cfdffff         | mov                 ecx, dword ptr [ebp - 0x2e4]
            //   8b490c               | mov                 ecx, dword ptr [ecx + 0xc]

        $sequence_9 = { eb0c ff15???????? 8b8d24ffffff 8b9550ffffff }
            // n = 4, score = 100
            //   eb0c                 | jmp                 0xe
            //   ff15????????         |                     
            //   8b8d24ffffff         | mov                 ecx, dword ptr [ebp - 0xdc]
            //   8b9550ffffff         | mov                 edx, dword ptr [ebp - 0xb0]

        $sequence_10 = { eb0c ff15???????? 8b8d6cffffff 8b710c }
            // n = 4, score = 100
            //   eb0c                 | jmp                 0xe
            //   ff15????????         |                     
            //   8b8d6cffffff         | mov                 ecx, dword ptr [ebp - 0x94]
            //   8b710c               | mov                 esi, dword ptr [ecx + 0xc]

        $sequence_11 = { eb0c ff15???????? 8b8d7cffffff 8b490c 682000cc00 }
            // n = 5, score = 100
            //   eb0c                 | jmp                 0xe
            //   ff15????????         |                     
            //   8b8d7cffffff         | mov                 ecx, dword ptr [ebp - 0x84]
            //   8b490c               | mov                 ecx, dword ptr [ecx + 0xc]
            //   682000cc00           | push                0xcc0020

        $sequence_12 = { eb0c ff15???????? 8b8df8fcffff 8b490c }
            // n = 4, score = 100
            //   eb0c                 | jmp                 0xe
            //   ff15????????         |                     
            //   8b8df8fcffff         | mov                 ecx, dword ptr [ebp - 0x308]
            //   8b490c               | mov                 ecx, dword ptr [ecx + 0xc]

        $sequence_13 = { eb0d 8b16 6a00 6a04 }
            // n = 4, score = 100
            //   eb0d                 | jmp                 0xf
            //   8b16                 | mov                 edx, dword ptr [esi]
            //   6a00                 | push                0
            //   6a04                 | push                4

        $sequence_14 = { eb0c ff15???????? 8b8d68ffffff 8b490c }
            // n = 4, score = 100
            //   eb0c                 | jmp                 0xe
            //   ff15????????         |                     
            //   8b8d68ffffff         | mov                 ecx, dword ptr [ebp - 0x98]
            //   8b490c               | mov                 ecx, dword ptr [ecx + 0xc]

        $sequence_15 = { eb0c ff15???????? 8b8d14fdffff 8b490c 03c8 83ec10 8bd4 }
            // n = 7, score = 100
            //   eb0c                 | jmp                 0xe
            //   ff15????????         |                     
            //   8b8d14fdffff         | mov                 ecx, dword ptr [ebp - 0x2ec]
            //   8b490c               | mov                 ecx, dword ptr [ecx + 0xc]
            //   03c8                 | add                 ecx, eax
            //   83ec10               | sub                 esp, 0x10
            //   8bd4                 | mov                 edx, esp

    condition:
        7 of them and filesize < 8560640
}
Download all Yara Rules