General
-
Target
4e2b1668336a7974e3fecbbd0a41d53f
-
Size
171KB
-
Sample
240109-ng33tsgbhn
-
MD5
4e2b1668336a7974e3fecbbd0a41d53f
-
SHA1
686e9190da94c91c2f72bbd274d4a0e41d7bfeef
-
SHA256
4a3132a3f4d12ffcea6cb6994ff26ea8090baf07a93598a056b7b26e1e9456db
-
SHA512
7c42e7bf65c0c9485c2cb43d65a1035c4b5f761e766e360dceb02915b06bf81c951166c984d7e6d9f7060f3f9bb43298ec4f16cdc7675768dda61a760bd3bd57
-
SSDEEP
3072:YxexkMNY+4n8iVMMSq3Gso2APwDQTvZMQlrX8Zv:o6k/+4nNv8vIDQqS41
Static task
static1
Behavioral task
behavioral1
Sample
4e2b1668336a7974e3fecbbd0a41d53f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e2b1668336a7974e3fecbbd0a41d53f.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
4e2b1668336a7974e3fecbbd0a41d53f
-
Size
171KB
-
MD5
4e2b1668336a7974e3fecbbd0a41d53f
-
SHA1
686e9190da94c91c2f72bbd274d4a0e41d7bfeef
-
SHA256
4a3132a3f4d12ffcea6cb6994ff26ea8090baf07a93598a056b7b26e1e9456db
-
SHA512
7c42e7bf65c0c9485c2cb43d65a1035c4b5f761e766e360dceb02915b06bf81c951166c984d7e6d9f7060f3f9bb43298ec4f16cdc7675768dda61a760bd3bd57
-
SSDEEP
3072:YxexkMNY+4n8iVMMSq3Gso2APwDQTvZMQlrX8Zv:o6k/+4nNv8vIDQqS41
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-