General
-
Target
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14
-
Size
136KB
-
Sample
220811-s5qvmahafr
-
MD5
0c8d4181cfb8a34505b231c7d0fdc401
-
SHA1
ab6d29707a9121b2267d213cec0edbf0d9f896f1
-
SHA256
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14
-
SHA512
d7f8e2a6d01f48f8591cbc297f1906416b810aa730e66c7618c9ab6d8e7ed1a68935bf38984b392c211a9d1186e1e8ba9f68ed7370f88b11b5568285adbb1a86
Static task
static1
Behavioral task
behavioral1
Sample
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
xtremerat
no-hack.zapto.org
np.camfrog-ir.zapto.org
camfrog-2r9.zapto.org
Targets
-
-
Target
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14
-
Size
136KB
-
MD5
0c8d4181cfb8a34505b231c7d0fdc401
-
SHA1
ab6d29707a9121b2267d213cec0edbf0d9f896f1
-
SHA256
45b2938ed3ae72cc8079d9730fa948c7919500da3bf52b7385f8725c72c18d14
-
SHA512
d7f8e2a6d01f48f8591cbc297f1906416b810aa730e66c7618c9ab6d8e7ed1a68935bf38984b392c211a9d1186e1e8ba9f68ed7370f88b11b5568285adbb1a86
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-