General

  • Target

    76478c57bfca36590c9fcf0d11d5b2a7

  • Size

    197KB

  • Sample

    240126-d5cknseedn

  • MD5

    76478c57bfca36590c9fcf0d11d5b2a7

  • SHA1

    29a128ddd8aa27aae0d675882aaceccdd2c2ae87

  • SHA256

    4558b67c0ab3a730365007aa4decba5870a805cb60759a3f4c1b8b5ee8355708

  • SHA512

    c771b4fd30cc326a69fb18b5a5bf10a6e376e329b4d1b44b334ed6f1fad9850c440b02e5e991841c409b043cc30c3fc36aba488502e57bf5cfd1f75ae26d5cbd

  • SSDEEP

    6144:d3+WEwnVW5GJZ2tNYLj8Mfs1RXqNzPJGWzo:duWEAVzYKj86sTQ4T

Malware Config

Extracted

Family

xtremerat

C2

mom2004.zapto.org

Targets

    • Target

      76478c57bfca36590c9fcf0d11d5b2a7

    • Size

      197KB

    • MD5

      76478c57bfca36590c9fcf0d11d5b2a7

    • SHA1

      29a128ddd8aa27aae0d675882aaceccdd2c2ae87

    • SHA256

      4558b67c0ab3a730365007aa4decba5870a805cb60759a3f4c1b8b5ee8355708

    • SHA512

      c771b4fd30cc326a69fb18b5a5bf10a6e376e329b4d1b44b334ed6f1fad9850c440b02e5e991841c409b043cc30c3fc36aba488502e57bf5cfd1f75ae26d5cbd

    • SSDEEP

      6144:d3+WEwnVW5GJZ2tNYLj8Mfs1RXqNzPJGWzo:duWEAVzYKj86sTQ4T

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks