General
-
Target
c08d396078b9fa1cf6ded3e455e1b4cc
-
Size
438KB
-
Sample
240311-n75z4saa35
-
MD5
c08d396078b9fa1cf6ded3e455e1b4cc
-
SHA1
e0b51d3423144663582d8e75fa26a4f2fe4e5f32
-
SHA256
f8168fcb9494edcf085245b170c4584ba9c33559559bb7ebf6ac5a06508ccad4
-
SHA512
2f5f5d67b95eb7a7802a9fff097b14aabcf64d7c2bb7760b400a85d08568ae6febe53bc7de69e222062d9298616f43db35309589ffae32908c51061ee105aae2
-
SSDEEP
12288:2VFFEqmvg4nyNh+OjXG4qfROGapCB0PWdUQ:uXE1g8oxLz03GCB0P3Q
Behavioral task
behavioral1
Sample
c08d396078b9fa1cf6ded3e455e1b4cc.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c08d396078b9fa1cf6ded3e455e1b4cc.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
xtremerat
step6.no-ip.info
Targets
-
-
Target
c08d396078b9fa1cf6ded3e455e1b4cc
-
Size
438KB
-
MD5
c08d396078b9fa1cf6ded3e455e1b4cc
-
SHA1
e0b51d3423144663582d8e75fa26a4f2fe4e5f32
-
SHA256
f8168fcb9494edcf085245b170c4584ba9c33559559bb7ebf6ac5a06508ccad4
-
SHA512
2f5f5d67b95eb7a7802a9fff097b14aabcf64d7c2bb7760b400a85d08568ae6febe53bc7de69e222062d9298616f43db35309589ffae32908c51061ee105aae2
-
SSDEEP
12288:2VFFEqmvg4nyNh+OjXG4qfROGapCB0PWdUQ:uXE1g8oxLz03GCB0P3Q
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-