Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2024 18:48
Behavioral task
behavioral1
Sample
5b9678025a320f55060edadac3c62249.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b9678025a320f55060edadac3c62249.exe
Resource
win10v2004-20231222-en
General
-
Target
5b9678025a320f55060edadac3c62249.exe
-
Size
65KB
-
MD5
5b9678025a320f55060edadac3c62249
-
SHA1
6f51ac8be18916eb89af18f56b4044366cba13ec
-
SHA256
3f32c35a482f1afa38b0576374fa391148c1a6a7b7b94e39c7e83c285f41efd7
-
SHA512
9081eeb3f6491933f0bfc9f83798c6b9a724bd674e5f63356db880a1e845cc07d7923807069d743ed3d9adca51ebc5204d14e82bb4e59ad0a77acf70f267ade2
-
SSDEEP
768:d9m1Sq4NQkrBsH1U8z05DeeQuMVTyN8ipHo37Vmd6AeXVtWAJ7A+7voNw:asq+Q1aZQuIyJp0mgA+FJ0LNw
Malware Config
Extracted
xtremerat
alssm.no-ip.biz
Signatures
-
Detect XtremeRAT payload 2 IoCs
resource yara_rule behavioral2/memory/2672-0-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat behavioral2/memory/2672-3-0x0000000010000000-0x0000000010048000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).