General

  • Target

    c48e73afd79c416afbac8d04bf1c50cc50a515cb377ebb00d61f2b1574d649cc

  • Size

    160KB

  • MD5

    0fd0df476682042c2db5832e24d65920

  • SHA1

    fd0e0bacc9e132a732b653eb1c2f1915a412ae99

  • SHA256

    c48e73afd79c416afbac8d04bf1c50cc50a515cb377ebb00d61f2b1574d649cc

  • SHA512

    14c34e38c49c1ce3e49bf53294722f19a0d096b12c502bee82ba68dc4eda8775cd72d5f4f1c6e6a8f48a5067dfa023bf1a09cc011a7fcc75337f63e66f7360f7

  • SSDEEP

    3072:ENW7dEvotvXq4Zo0zCkUL/ZlXqdhmFCTvUU11+c0uGUjcfqurs0f:ENW7mvI6oClaq8UU2hfquL

Score
10/10

Malware Config

Signatures

  • Detect XtremeRAT payload 1 IoCs
  • Xtremerat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • c48e73afd79c416afbac8d04bf1c50cc50a515cb377ebb00d61f2b1574d649cc
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections