General
-
Target
76478c57bfca36590c9fcf0d11d5b2a7
-
Size
197KB
-
Sample
240126-d5cknseedn
-
MD5
76478c57bfca36590c9fcf0d11d5b2a7
-
SHA1
29a128ddd8aa27aae0d675882aaceccdd2c2ae87
-
SHA256
4558b67c0ab3a730365007aa4decba5870a805cb60759a3f4c1b8b5ee8355708
-
SHA512
c771b4fd30cc326a69fb18b5a5bf10a6e376e329b4d1b44b334ed6f1fad9850c440b02e5e991841c409b043cc30c3fc36aba488502e57bf5cfd1f75ae26d5cbd
-
SSDEEP
6144:d3+WEwnVW5GJZ2tNYLj8Mfs1RXqNzPJGWzo:duWEAVzYKj86sTQ4T
Static task
static1
Behavioral task
behavioral1
Sample
76478c57bfca36590c9fcf0d11d5b2a7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
76478c57bfca36590c9fcf0d11d5b2a7.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
xtremerat
mom2004.zapto.org
Targets
-
-
Target
76478c57bfca36590c9fcf0d11d5b2a7
-
Size
197KB
-
MD5
76478c57bfca36590c9fcf0d11d5b2a7
-
SHA1
29a128ddd8aa27aae0d675882aaceccdd2c2ae87
-
SHA256
4558b67c0ab3a730365007aa4decba5870a805cb60759a3f4c1b8b5ee8355708
-
SHA512
c771b4fd30cc326a69fb18b5a5bf10a6e376e329b4d1b44b334ed6f1fad9850c440b02e5e991841c409b043cc30c3fc36aba488502e57bf5cfd1f75ae26d5cbd
-
SSDEEP
6144:d3+WEwnVW5GJZ2tNYLj8Mfs1RXqNzPJGWzo:duWEAVzYKj86sTQ4T
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-