General

  • Target

    69e99e879cc0f5f739c1a6750c5c279dfdadeda838da65bd17b2343328e22a0f

  • Size

    81KB

  • Sample

    221002-qje5wsgdd8

  • MD5

    5d5478858f3f577c7628a0eda9c9cdc7

  • SHA1

    afff05b8f81457211f5ebf5d4b70aef4b7dd2bb0

  • SHA256

    69e99e879cc0f5f739c1a6750c5c279dfdadeda838da65bd17b2343328e22a0f

  • SHA512

    6c17fe8a8f03dbfa17aed973700ec5a42dac237fc62ba740b0e9f28b708e6ab9d4da7482eca44b68504205c3cc02647e04f1397cc4ee43e7ba64ec06573759a1

  • SSDEEP

    1536:KGid3wJr+40YeQY3Z05lfrHJuLxwq1Uaz1ognWGlZre9:KR3wJr+4ZezyvjHE1n1UazRnfk

Malware Config

Extracted

Family

xtremerat

C2

qp.no-ip.org

Targets

    • Target

      69e99e879cc0f5f739c1a6750c5c279dfdadeda838da65bd17b2343328e22a0f

    • Size

      81KB

    • MD5

      5d5478858f3f577c7628a0eda9c9cdc7

    • SHA1

      afff05b8f81457211f5ebf5d4b70aef4b7dd2bb0

    • SHA256

      69e99e879cc0f5f739c1a6750c5c279dfdadeda838da65bd17b2343328e22a0f

    • SHA512

      6c17fe8a8f03dbfa17aed973700ec5a42dac237fc62ba740b0e9f28b708e6ab9d4da7482eca44b68504205c3cc02647e04f1397cc4ee43e7ba64ec06573759a1

    • SSDEEP

      1536:KGid3wJr+40YeQY3Z05lfrHJuLxwq1Uaz1ognWGlZre9:KR3wJr+4ZezyvjHE1n1UazRnfk

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks