Behavioral task
behavioral1
Sample
2a13ee7d1914c98393bda3554612e191f8f901df26365c46179d5a4322289bb6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2a13ee7d1914c98393bda3554612e191f8f901df26365c46179d5a4322289bb6.exe
Resource
win10v2004-20220812-en
General
-
Target
2a13ee7d1914c98393bda3554612e191f8f901df26365c46179d5a4322289bb6
-
Size
45KB
-
MD5
02ecaad1f5e5208950644f583849de92
-
SHA1
8b39191820f708b2c002fc1229c00684d9552e14
-
SHA256
2a13ee7d1914c98393bda3554612e191f8f901df26365c46179d5a4322289bb6
-
SHA512
2ffaf1bf2fd39a965db8ae7b6dc9182262ae13183219facd4430505e7bb41c933a6b8f790577b1f604e936ac30df99f0df8b399ca456834f84382af05d1bfd4b
-
SSDEEP
768:LBr+tjFqTPkAlfztB1lr6anysmTA8uvm2DfOTwOPczoB:lyRUHlrL1lr6anKTLuvm2bMsoB
Malware Config
Signatures
-
Detect XtremeRAT payload 1 IoCs
resource yara_rule sample family_xtremerat -
Xtremerat family
Files
-
2a13ee7d1914c98393bda3554612e191f8f901df26365c46179d5a4322289bb6.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 11KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ