General

  • Target

    d5222962327308ce92ec21675e9c5934df63847400b3741136c23d3220191e39

  • Size

    85KB

  • Sample

    221122-y1dmdsff66

  • MD5

    47551bd56f033df8c3c5ad9997815124

  • SHA1

    d90fa1bc37e8c25bb8397f7de6cf169e0b392e8b

  • SHA256

    d5222962327308ce92ec21675e9c5934df63847400b3741136c23d3220191e39

  • SHA512

    c28260303ec03207a2ffbb65f8441a1a3de49bb79008e539f19814fabad95f2595d9f114c92665a7136f3de683bbd24ce0945f63608633c4aa24a1595acbc8b7

  • SSDEEP

    1536:Gsq+QV4rObAdXWpf/y+7ozNwiE5u/5uSoSeM:H44rj/WodE5u/5uSoSeM

Malware Config

Extracted

Family

xtremerat

C2

seids.no-ip.org

Targets

    • Target

      d5222962327308ce92ec21675e9c5934df63847400b3741136c23d3220191e39

    • Size

      85KB

    • MD5

      47551bd56f033df8c3c5ad9997815124

    • SHA1

      d90fa1bc37e8c25bb8397f7de6cf169e0b392e8b

    • SHA256

      d5222962327308ce92ec21675e9c5934df63847400b3741136c23d3220191e39

    • SHA512

      c28260303ec03207a2ffbb65f8441a1a3de49bb79008e539f19814fabad95f2595d9f114c92665a7136f3de683bbd24ce0945f63608633c4aa24a1595acbc8b7

    • SSDEEP

      1536:Gsq+QV4rObAdXWpf/y+7ozNwiE5u/5uSoSeM:H44rj/WodE5u/5uSoSeM

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

MITRE ATT&CK Enterprise v6

Tasks