General
-
Target
c6e61e1c71ffe0bfada815f3bbd030c2
-
Size
224KB
-
Sample
240313-1a8qyshd71
-
MD5
c6e61e1c71ffe0bfada815f3bbd030c2
-
SHA1
b6062e39f90190afc49f9263c3d6c142463ba4b8
-
SHA256
f107b5194dd52d81cdc4db22937344db1d77658a106095708563d9b7a250b724
-
SHA512
5dc097d3c503a3a499623b133c7f485f4f493122cb72d0ca20f6a83a83537203de9932efb34c22fb2fc9869b1857468d6d6451d42feada9d5256aa925897333a
-
SSDEEP
6144:PJtDhxzkeP0G5xSeZWqpJzI3e3OT9uiGKrQ:PJtDPzkiL5xSeZJpue3uuiG5
Static task
static1
Behavioral task
behavioral1
Sample
c6e61e1c71ffe0bfada815f3bbd030c2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6e61e1c71ffe0bfada815f3bbd030c2.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
xtremerat
kita2011.zapto.org
Ÿ杋效愨摈kita2011.zapto.org
kita2011.dyndns-ip.com
Targets
-
-
Target
c6e61e1c71ffe0bfada815f3bbd030c2
-
Size
224KB
-
MD5
c6e61e1c71ffe0bfada815f3bbd030c2
-
SHA1
b6062e39f90190afc49f9263c3d6c142463ba4b8
-
SHA256
f107b5194dd52d81cdc4db22937344db1d77658a106095708563d9b7a250b724
-
SHA512
5dc097d3c503a3a499623b133c7f485f4f493122cb72d0ca20f6a83a83537203de9932efb34c22fb2fc9869b1857468d6d6451d42feada9d5256aa925897333a
-
SSDEEP
6144:PJtDhxzkeP0G5xSeZWqpJzI3e3OT9uiGKrQ:PJtDPzkiL5xSeZJpue3uuiG5
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-