General
-
Target
dcf0426cf8452536d86428a5a1ae8a43a21a38fa74fb9b5e80f3b26f1976d56b
-
Size
536KB
-
Sample
221204-dhfzkseh9v
-
MD5
f9669d139ea87703d4f818f596e2380a
-
SHA1
273e9e376e1872e0edec7e67f75cf539f7ff4173
-
SHA256
dcf0426cf8452536d86428a5a1ae8a43a21a38fa74fb9b5e80f3b26f1976d56b
-
SHA512
a9ec32c90822c721b3a54651418c936abaf4337c58278604e03567cf2c4bbc51e753405532a125e63695eb8fbecba2a35019e7525d39ac1e88b9eddd4112aad5
-
SSDEEP
3072:11qI8JDKei598pR0d4uj+1JE7t4XGKLZtw7HdJMuTSnZ1db4ri:jqwpZ+Z1db4
Static task
static1
Behavioral task
behavioral1
Sample
dcf0426cf8452536d86428a5a1ae8a43a21a38fa74fb9b5e80f3b26f1976d56b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dcf0426cf8452536d86428a5a1ae8a43a21a38fa74fb9b5e80f3b26f1976d56b.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
xtremerat
ax0.no-ip.biz
�mrjoo.no-ip.info
jomeka.no-ip.biz
Targets
-
-
Target
dcf0426cf8452536d86428a5a1ae8a43a21a38fa74fb9b5e80f3b26f1976d56b
-
Size
536KB
-
MD5
f9669d139ea87703d4f818f596e2380a
-
SHA1
273e9e376e1872e0edec7e67f75cf539f7ff4173
-
SHA256
dcf0426cf8452536d86428a5a1ae8a43a21a38fa74fb9b5e80f3b26f1976d56b
-
SHA512
a9ec32c90822c721b3a54651418c936abaf4337c58278604e03567cf2c4bbc51e753405532a125e63695eb8fbecba2a35019e7525d39ac1e88b9eddd4112aad5
-
SSDEEP
3072:11qI8JDKei598pR0d4uj+1JE7t4XGKLZtw7HdJMuTSnZ1db4ri:jqwpZ+Z1db4
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Suspicious use of SetThreadContext
-