General

  • Target

    a6fbe88c20de336bbe9f6b10ca1848c6

  • Size

    680KB

  • Sample

    240226-wlfgbscc84

  • MD5

    a6fbe88c20de336bbe9f6b10ca1848c6

  • SHA1

    c8d1fe52d89ec10cae28949b0ce5b0e04773e637

  • SHA256

    795efd2a6786010125a93813cd8e7ceda56e29c480cf362922d3527d94b023c3

  • SHA512

    d8aea197f1c607ba043729524ecad946644a2f87f864f8ffd70e1e47579fdaef6accf3502882ee3df4cf3d2555e596610f00df22244e85b0a6b58633538d3d10

  • SSDEEP

    3072:+NLlDCJsXc9VGE7EIUlr2iCuXjSo/lTbFdPLQKxmpNQHNgJMqfA8PaVttICJw4Ma:eZXMK0ZwIQlZwm

Malware Config

Extracted

Family

xtremerat

C2

abdallam.no-ip.biz

Targets

    • Target

      a6fbe88c20de336bbe9f6b10ca1848c6

    • Size

      680KB

    • MD5

      a6fbe88c20de336bbe9f6b10ca1848c6

    • SHA1

      c8d1fe52d89ec10cae28949b0ce5b0e04773e637

    • SHA256

      795efd2a6786010125a93813cd8e7ceda56e29c480cf362922d3527d94b023c3

    • SHA512

      d8aea197f1c607ba043729524ecad946644a2f87f864f8ffd70e1e47579fdaef6accf3502882ee3df4cf3d2555e596610f00df22244e85b0a6b58633538d3d10

    • SSDEEP

      3072:+NLlDCJsXc9VGE7EIUlr2iCuXjSo/lTbFdPLQKxmpNQHNgJMqfA8PaVttICJw4Ma:eZXMK0ZwIQlZwm

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks