General

  • Target

    10751958871aa1a05353ab771f9f3d82

  • Size

    93KB

  • Sample

    231230-glxchsgfbk

  • MD5

    10751958871aa1a05353ab771f9f3d82

  • SHA1

    86fac3924d2fdea3b781adb585c4045f5ec0f0ee

  • SHA256

    1ca47bfdd246a8fa3539f12fdb6805203779fc8990ec14922f76822aa7d3a026

  • SHA512

    3e1f01f7cdbe7f8a16cff2b3c89bd6be131d997b4397d89b9524b2599ed69591b15e3f9d3e13f1e99c493f6e463f8e47e7974879ecc8950acfb983676cdcddbd

  • SSDEEP

    1536:qdBs8iAqJuaOarNtWK1Y84rCmgvkkFQfcITcyhgLKLkqnYoe/P:Ay80JuaO6NJG84mbOfcIFhXLkqy/P

Malware Config

Extracted

Family

xtremerat

C2

jack-12.no-ip.org

Targets

    • Target

      10751958871aa1a05353ab771f9f3d82

    • Size

      93KB

    • MD5

      10751958871aa1a05353ab771f9f3d82

    • SHA1

      86fac3924d2fdea3b781adb585c4045f5ec0f0ee

    • SHA256

      1ca47bfdd246a8fa3539f12fdb6805203779fc8990ec14922f76822aa7d3a026

    • SHA512

      3e1f01f7cdbe7f8a16cff2b3c89bd6be131d997b4397d89b9524b2599ed69591b15e3f9d3e13f1e99c493f6e463f8e47e7974879ecc8950acfb983676cdcddbd

    • SSDEEP

      1536:qdBs8iAqJuaOarNtWK1Y84rCmgvkkFQfcITcyhgLKLkqnYoe/P:Ay80JuaO6NJG84mbOfcIFhXLkqy/P

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks