General

  • Target

    9c0f15d4b2b716efa114ad27a5e759cc4811c5b8d64cf1b713777dcbd628d326

  • Size

    300KB

  • Sample

    220708-h7pegahag3

  • MD5

    41067cbbcc67bc6a3f1452aa9282ec0f

  • SHA1

    9fa39399e8d8e8027dfbbe12e4a023f7ee3581e5

  • SHA256

    9c0f15d4b2b716efa114ad27a5e759cc4811c5b8d64cf1b713777dcbd628d326

  • SHA512

    c39d4e0d833c28f74d0564a97cf43733741336e246f6bcde8497a3bace6e653016e2fe993bc70ac47eb47403de44160973b1d6da6bacdc0caf341aaf4a899d35

Malware Config

Targets

    • Target

      9c0f15d4b2b716efa114ad27a5e759cc4811c5b8d64cf1b713777dcbd628d326

    • Size

      300KB

    • MD5

      41067cbbcc67bc6a3f1452aa9282ec0f

    • SHA1

      9fa39399e8d8e8027dfbbe12e4a023f7ee3581e5

    • SHA256

      9c0f15d4b2b716efa114ad27a5e759cc4811c5b8d64cf1b713777dcbd628d326

    • SHA512

      c39d4e0d833c28f74d0564a97cf43733741336e246f6bcde8497a3bace6e653016e2fe993bc70ac47eb47403de44160973b1d6da6bacdc0caf341aaf4a899d35

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Modifies Installed Components in the registry

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks