General
-
Target
cfbad8243044fa4e00f23ed44c24ee3ff50e5b01dcb7c483dbb6d71675236c9e
-
Size
217KB
-
Sample
221206-vb15lseh53
-
MD5
b4f5bfc0ab0cc3d6b7a6b9653784de56
-
SHA1
c5314c708dbcd5d2f76bdab8ea3848c2bc1777c9
-
SHA256
cfbad8243044fa4e00f23ed44c24ee3ff50e5b01dcb7c483dbb6d71675236c9e
-
SHA512
f94b3d6f024e64fa8761a4db9dbb5c8d308752d487fb3f859ae5d22ef950ebf200787c9d491462248fedcbbd031b6c8d1c3c3c0415b0f13b2777a237b4d314e4
-
SSDEEP
3072:D1dlKwgj23+Oz05YoNozPTQydKKQR4KQS+2YkX4NX1enJ0fVTdCqBzIwPwR/3HFX:D1dlZro5yPTQyoKjh2Yn91285dFz1mH9
Static task
static1
Behavioral task
behavioral1
Sample
cfbad8243044fa4e00f23ed44c24ee3ff50e5b01dcb7c483dbb6d71675236c9e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cfbad8243044fa4e00f23ed44c24ee3ff50e5b01dcb7c483dbb6d71675236c9e.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
xtremerat
mjed10.no-ip.info
remoteback.no-ip.biz
Targets
-
-
Target
cfbad8243044fa4e00f23ed44c24ee3ff50e5b01dcb7c483dbb6d71675236c9e
-
Size
217KB
-
MD5
b4f5bfc0ab0cc3d6b7a6b9653784de56
-
SHA1
c5314c708dbcd5d2f76bdab8ea3848c2bc1777c9
-
SHA256
cfbad8243044fa4e00f23ed44c24ee3ff50e5b01dcb7c483dbb6d71675236c9e
-
SHA512
f94b3d6f024e64fa8761a4db9dbb5c8d308752d487fb3f859ae5d22ef950ebf200787c9d491462248fedcbbd031b6c8d1c3c3c0415b0f13b2777a237b4d314e4
-
SSDEEP
3072:D1dlKwgj23+Oz05YoNozPTQydKKQR4KQS+2YkX4NX1enJ0fVTdCqBzIwPwR/3HFX:D1dlZro5yPTQyoKjh2Yn91285dFz1mH9
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-