General
-
Target
993945a4469d2a4df7441f00b3a9afb636c1a8f22c1fb84da636c103d415401f
-
Size
433KB
-
Sample
221205-z8w95sha97
-
MD5
429eb5d1c09cdda88c7e3148dd135d10
-
SHA1
d722535d958f4594dcd20b7b2697965f8104bc4a
-
SHA256
993945a4469d2a4df7441f00b3a9afb636c1a8f22c1fb84da636c103d415401f
-
SHA512
7e753c895c12aae35f8def4efe0fc0dbc3a2dac6abdbffab04e0c51145377e832a0eeb3cee9a6b44693f7bb4f84277c35f28b08c5e397cac2776497874dd2f78
-
SSDEEP
12288:L8hknZKZlGRgO2qmq9kR6lhKX1B3a9FsqJKB57d8fKFdrAH7:LgMZKZcRgONmq9g64B36rKX6y/AH7
Static task
static1
Behavioral task
behavioral1
Sample
993945a4469d2a4df7441f00b3a9afb636c1a8f22c1fb84da636c103d415401f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
993945a4469d2a4df7441f00b3a9afb636c1a8f22c1fb84da636c103d415401f.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
xtremerat
okkah.no-ip.biz
Targets
-
-
Target
993945a4469d2a4df7441f00b3a9afb636c1a8f22c1fb84da636c103d415401f
-
Size
433KB
-
MD5
429eb5d1c09cdda88c7e3148dd135d10
-
SHA1
d722535d958f4594dcd20b7b2697965f8104bc4a
-
SHA256
993945a4469d2a4df7441f00b3a9afb636c1a8f22c1fb84da636c103d415401f
-
SHA512
7e753c895c12aae35f8def4efe0fc0dbc3a2dac6abdbffab04e0c51145377e832a0eeb3cee9a6b44693f7bb4f84277c35f28b08c5e397cac2776497874dd2f78
-
SSDEEP
12288:L8hknZKZlGRgO2qmq9kR6lhKX1B3a9FsqJKB57d8fKFdrAH7:LgMZKZcRgONmq9g64B36rKX6y/AH7
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-