General
-
Target
971548addc373b70e70c748ddb279cfd
-
Size
885KB
-
Sample
240212-nypa1aeb87
-
MD5
971548addc373b70e70c748ddb279cfd
-
SHA1
0e77d592c9a243a172a4d72069f07b6d79a7209d
-
SHA256
215b3350b74a68b685582e93b42c4763c6626df94cc2243281bf997d7d83d581
-
SHA512
c98b06ffc9b809b7ddd22a35d5dade65b080268ca76f7b836d9110e7140056d0db022b1e8f06ff99713aec33565e82c0a1b338caf2d0c18a30a3b8da17e9a1b0
-
SSDEEP
12288:s2cjEJnk5y6/FOD1ho6zWD07N0RoG5XS6SarFLhzFAkNoDF/UE5VmKT+A/ixVDN:spjEJ5cO5h/7N0RtpfFAkNkFzBZ
Behavioral task
behavioral1
Sample
971548addc373b70e70c748ddb279cfd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
971548addc373b70e70c748ddb279cfd.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
xtremerat
Ꟙstabilhayko.no-ip.org
Targets
-
-
Target
971548addc373b70e70c748ddb279cfd
-
Size
885KB
-
MD5
971548addc373b70e70c748ddb279cfd
-
SHA1
0e77d592c9a243a172a4d72069f07b6d79a7209d
-
SHA256
215b3350b74a68b685582e93b42c4763c6626df94cc2243281bf997d7d83d581
-
SHA512
c98b06ffc9b809b7ddd22a35d5dade65b080268ca76f7b836d9110e7140056d0db022b1e8f06ff99713aec33565e82c0a1b338caf2d0c18a30a3b8da17e9a1b0
-
SSDEEP
12288:s2cjEJnk5y6/FOD1ho6zWD07N0RoG5XS6SarFLhzFAkNoDF/UE5VmKT+A/ixVDN:spjEJ5cO5h/7N0RtpfFAkNkFzBZ
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-