General

  • Target

    a3394a6003883bd628e32a61a67a3f22b3ea37a893b3d1500596e977c3b57e7d

  • Size

    78KB

  • Sample

    221206-2vtm7see9v

  • MD5

    510a094e0bf585ef9149d8747a23e215

  • SHA1

    9c66f96ddf62839afdd960962010d5ff92557ace

  • SHA256

    a3394a6003883bd628e32a61a67a3f22b3ea37a893b3d1500596e977c3b57e7d

  • SHA512

    4be27e033aa12ab29626a199ab591b823335f875a7a71d1fe890fe618ebcbeb666c2fb8ed217ae72b5a4af88e509464c1bcf2dc57fe873571d08a9e6758d16d7

  • SSDEEP

    1536:Jag/DLWhS9CNDLJZUkGG2+v7JK6YZCs678OHYA9U1b2au:JaYWcoNDLJZUStK6YF67PWKau

Malware Config

Extracted

Family

xtremerat

C2

cuore.no-ip.org

Targets

    • Target

      a3394a6003883bd628e32a61a67a3f22b3ea37a893b3d1500596e977c3b57e7d

    • Size

      78KB

    • MD5

      510a094e0bf585ef9149d8747a23e215

    • SHA1

      9c66f96ddf62839afdd960962010d5ff92557ace

    • SHA256

      a3394a6003883bd628e32a61a67a3f22b3ea37a893b3d1500596e977c3b57e7d

    • SHA512

      4be27e033aa12ab29626a199ab591b823335f875a7a71d1fe890fe618ebcbeb666c2fb8ed217ae72b5a4af88e509464c1bcf2dc57fe873571d08a9e6758d16d7

    • SSDEEP

      1536:Jag/DLWhS9CNDLJZUkGG2+v7JK6YZCs678OHYA9U1b2au:JaYWcoNDLJZUStK6YF67PWKau

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks