General

  • Target

    9511bc47977109523305355c4988d36bce5ae31f137415fead22f1a99a0956cb

  • Size

    106KB

  • Sample

    221204-c2g6bahh25

  • MD5

    d40f3860f368a7aba9042c64a81f976a

  • SHA1

    6118d1a559aa28d5cfab82a6bffb7f32b345cc5b

  • SHA256

    9511bc47977109523305355c4988d36bce5ae31f137415fead22f1a99a0956cb

  • SHA512

    c751fdbb4507a9a96876f049ed6a4676913d73167832c7f558b255d875a32787cbaaf2b0b8eca42b7d305a4f0b9e4833bc42b9ae14b18be7440e5ad8e0fd77b1

  • SSDEEP

    1536:UMv0eWxcv2LAxM4yPp33eDdhoh8SHtNTIT2wRbsbGShrIqP6B/PhMGub8jbrhwH:UM8Zam4c3uZhPSNNKRbsbDIYEtbdw

Malware Config

Extracted

Family

xtremerat

C2

ripcurl32.no-ip.biz

Targets

    • Target

      9511bc47977109523305355c4988d36bce5ae31f137415fead22f1a99a0956cb

    • Size

      106KB

    • MD5

      d40f3860f368a7aba9042c64a81f976a

    • SHA1

      6118d1a559aa28d5cfab82a6bffb7f32b345cc5b

    • SHA256

      9511bc47977109523305355c4988d36bce5ae31f137415fead22f1a99a0956cb

    • SHA512

      c751fdbb4507a9a96876f049ed6a4676913d73167832c7f558b255d875a32787cbaaf2b0b8eca42b7d305a4f0b9e4833bc42b9ae14b18be7440e5ad8e0fd77b1

    • SSDEEP

      1536:UMv0eWxcv2LAxM4yPp33eDdhoh8SHtNTIT2wRbsbGShrIqP6B/PhMGub8jbrhwH:UM8Zam4c3uZhPSNNKRbsbDIYEtbdw

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks