General

  • Target

    7a446891f4ae4bfb463e960e16a8a65a

  • Size

    272KB

  • Sample

    240127-prtskscbg7

  • MD5

    7a446891f4ae4bfb463e960e16a8a65a

  • SHA1

    96c03e22edbb7e22e4a8e37e0962dfda87158517

  • SHA256

    2446229f6d118aea0521cb7987564c009c34faa50ddf292e23bc5b5ae020e8ad

  • SHA512

    c1c0711d8da7e42f6d8457307a858cb867ebf76cbdf52002c3270dfc8bfe4475daae066e177a98fe6aace32b2eba5b417d505069049d3c44a121cff0d4e0d4d9

  • SSDEEP

    3072:8IargcXEjCWZPZd/gitOOBXSrbwoUmqZYscJSiMe3oJa8QJfHy9rrX2+YqMunCKV:8Io5oBq321owo33zJPAMuCKczll6

Malware Config

Extracted

Family

xtremerat

C2

becha.no-ip.biz

Targets

    • Target

      7a446891f4ae4bfb463e960e16a8a65a

    • Size

      272KB

    • MD5

      7a446891f4ae4bfb463e960e16a8a65a

    • SHA1

      96c03e22edbb7e22e4a8e37e0962dfda87158517

    • SHA256

      2446229f6d118aea0521cb7987564c009c34faa50ddf292e23bc5b5ae020e8ad

    • SHA512

      c1c0711d8da7e42f6d8457307a858cb867ebf76cbdf52002c3270dfc8bfe4475daae066e177a98fe6aace32b2eba5b417d505069049d3c44a121cff0d4e0d4d9

    • SSDEEP

      3072:8IargcXEjCWZPZd/gitOOBXSrbwoUmqZYscJSiMe3oJa8QJfHy9rrX2+YqMunCKV:8Io5oBq321owo33zJPAMuCKczll6

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks