General
-
Target
e6a08acc2c63f7a8925e59a2409d1e28c8d85a430d50a1f1b2220b3b165aa533
-
Size
70KB
-
Sample
221002-sbj5zsbee3
-
MD5
64e7761a671db8b39ce71b8fe1454540
-
SHA1
190abb11d110aa42148e85ec699c0bce5865a442
-
SHA256
e6a08acc2c63f7a8925e59a2409d1e28c8d85a430d50a1f1b2220b3b165aa533
-
SHA512
4d18d3138b1fa30f8036795e05895a8c46088cf677beb5b9257237b2b9f631290fcbe809efe24481cdd80dc09ab7a55769ba4f72a2e1d72693ca8a2b3634781f
-
SSDEEP
1536:yH6hAyGAnnYQLpxniw62XS2H+mUJDo/EVzY5pFvZd9YKm4wXl:yaR7LfRS2HBwDpS3b9YKmF
Static task
static1
Behavioral task
behavioral1
Sample
e6a08acc2c63f7a8925e59a2409d1e28c8d85a430d50a1f1b2220b3b165aa533.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6a08acc2c63f7a8925e59a2409d1e28c8d85a430d50a1f1b2220b3b165aa533.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
xtremerat
deadsand.no-ip.biz
Targets
-
-
Target
e6a08acc2c63f7a8925e59a2409d1e28c8d85a430d50a1f1b2220b3b165aa533
-
Size
70KB
-
MD5
64e7761a671db8b39ce71b8fe1454540
-
SHA1
190abb11d110aa42148e85ec699c0bce5865a442
-
SHA256
e6a08acc2c63f7a8925e59a2409d1e28c8d85a430d50a1f1b2220b3b165aa533
-
SHA512
4d18d3138b1fa30f8036795e05895a8c46088cf677beb5b9257237b2b9f631290fcbe809efe24481cdd80dc09ab7a55769ba4f72a2e1d72693ca8a2b3634781f
-
SSDEEP
1536:yH6hAyGAnnYQLpxniw62XS2H+mUJDo/EVzY5pFvZd9YKm4wXl:yaR7LfRS2HBwDpS3b9YKmF
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-