General

  • Target

    dbe009ecd612b6289681f76fb64f98ce2d5efeaaa6813232d40854a8cd946fb6

  • Size

    1.1MB

  • Sample

    221206-mpgn5aab92

  • MD5

    7cfa95c64d1515819612e56bf89bf4e2

  • SHA1

    764f0cac28bbfa7c51faa0f19729f8fab190454a

  • SHA256

    dbe009ecd612b6289681f76fb64f98ce2d5efeaaa6813232d40854a8cd946fb6

  • SHA512

    b777978c0f31048ed855caa797cda107e2cf8d953bf4b48557c88c0a0db29ca553f14a392b6e7b2e4a1de68c0a822dcd2399065d4221a5b7787013cd5df306f2

  • SSDEEP

    6144:yv1fBM8bGtLoJYXQ1x/PhNXjJ5ne1pT1l0qrUi:aP6RMn/5NXLe3n0qrv

Malware Config

Extracted

Family

xtremerat

C2

scd.no-ip.biz

Targets

    • Target

      dbe009ecd612b6289681f76fb64f98ce2d5efeaaa6813232d40854a8cd946fb6

    • Size

      1.1MB

    • MD5

      7cfa95c64d1515819612e56bf89bf4e2

    • SHA1

      764f0cac28bbfa7c51faa0f19729f8fab190454a

    • SHA256

      dbe009ecd612b6289681f76fb64f98ce2d5efeaaa6813232d40854a8cd946fb6

    • SHA512

      b777978c0f31048ed855caa797cda107e2cf8d953bf4b48557c88c0a0db29ca553f14a392b6e7b2e4a1de68c0a822dcd2399065d4221a5b7787013cd5df306f2

    • SSDEEP

      6144:yv1fBM8bGtLoJYXQ1x/PhNXjJ5ne1pT1l0qrUi:aP6RMn/5NXLe3n0qrv

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks