Behavioral task
behavioral1
Sample
59bf58575e5cb95edd0cba98c8cc536ca096615260c43273dad177c353609f54.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
59bf58575e5cb95edd0cba98c8cc536ca096615260c43273dad177c353609f54.exe
Resource
win10v2004-20240226-en
General
-
Target
59bf58575e5cb95edd0cba98c8cc536ca096615260c43273dad177c353609f54
-
Size
301KB
-
MD5
6528e3c44027d013e9b7d68d36120aa9
-
SHA1
2f7b08ac26a38de24c288ae9594e2847f3e0f518
-
SHA256
59bf58575e5cb95edd0cba98c8cc536ca096615260c43273dad177c353609f54
-
SHA512
71103b6333802ded57993e969c002f8f507b17e35449e0a2501f1920cb4f8761c1220247876a11c752c0dae07e9102780edf95ab5517390ac99e1295803fa5ac
-
SSDEEP
768:k8m1Sq4NQErBsH1tzoisBKQI6dObAG/dq8uW29Ifnca/yyR+P2ujfGiiw8YqagXx:msq+QV4rObAdXWpf/y+Ub9giox
Malware Config
Signatures
-
Detect XtremeRAT payload 1 IoCs
resource yara_rule sample family_xtremerat -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
Xtremerat family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59bf58575e5cb95edd0cba98c8cc536ca096615260c43273dad177c353609f54
Files
-
59bf58575e5cb95edd0cba98c8cc536ca096615260c43273dad177c353609f54.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE