General

  • Target

    4e2b1668336a7974e3fecbbd0a41d53f

  • Size

    171KB

  • Sample

    240109-ng33tsgbhn

  • MD5

    4e2b1668336a7974e3fecbbd0a41d53f

  • SHA1

    686e9190da94c91c2f72bbd274d4a0e41d7bfeef

  • SHA256

    4a3132a3f4d12ffcea6cb6994ff26ea8090baf07a93598a056b7b26e1e9456db

  • SHA512

    7c42e7bf65c0c9485c2cb43d65a1035c4b5f761e766e360dceb02915b06bf81c951166c984d7e6d9f7060f3f9bb43298ec4f16cdc7675768dda61a760bd3bd57

  • SSDEEP

    3072:YxexkMNY+4n8iVMMSq3Gso2APwDQTvZMQlrX8Zv:o6k/+4nNv8vIDQqS41

Malware Config

Targets

    • Target

      4e2b1668336a7974e3fecbbd0a41d53f

    • Size

      171KB

    • MD5

      4e2b1668336a7974e3fecbbd0a41d53f

    • SHA1

      686e9190da94c91c2f72bbd274d4a0e41d7bfeef

    • SHA256

      4a3132a3f4d12ffcea6cb6994ff26ea8090baf07a93598a056b7b26e1e9456db

    • SHA512

      7c42e7bf65c0c9485c2cb43d65a1035c4b5f761e766e360dceb02915b06bf81c951166c984d7e6d9f7060f3f9bb43298ec4f16cdc7675768dda61a760bd3bd57

    • SSDEEP

      3072:YxexkMNY+4n8iVMMSq3Gso2APwDQTvZMQlrX8Zv:o6k/+4nNv8vIDQqS41

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Modifies Installed Components in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks