General

  • Target

    7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7

  • Size

    5.9MB

  • Sample

    221125-pxvl3ahb37

  • MD5

    2fbc0174ff722d1f00707e6a27e5dd80

  • SHA1

    8a659170031f322b219281a4cc3ed6d47c3aee75

  • SHA256

    7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7

  • SHA512

    c9f88b2cc414465badfb40e27c30c6eddc41311967e0c9ff10fba7fdf2b6cb777aa439cd55472383b51b88cd3c501b8c820ad591015d490910e6e1fdcdd48c2b

  • SSDEEP

    49152:hYK3LcULK7n6FHbkDO8nqqh3vZuCRWDovqxXXGqQIBJotMMDqUSGm2td3r7EdUFe:8kyDNCWCEM+m2L7D30X2ys

Malware Config

Extracted

Family

xtremerat

C2

google1.no-ip.biz

Targets

    • Target

      7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7

    • Size

      5.9MB

    • MD5

      2fbc0174ff722d1f00707e6a27e5dd80

    • SHA1

      8a659170031f322b219281a4cc3ed6d47c3aee75

    • SHA256

      7cc0adc3e5901de13af13530fe7f12e8dc9b02f6a68072f170e89dce06dd11d7

    • SHA512

      c9f88b2cc414465badfb40e27c30c6eddc41311967e0c9ff10fba7fdf2b6cb777aa439cd55472383b51b88cd3c501b8c820ad591015d490910e6e1fdcdd48c2b

    • SSDEEP

      49152:hYK3LcULK7n6FHbkDO8nqqh3vZuCRWDovqxXXGqQIBJotMMDqUSGm2td3r7EdUFe:8kyDNCWCEM+m2L7D30X2ys

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks