General

  • Target

    c6e61e1c71ffe0bfada815f3bbd030c2

  • Size

    224KB

  • Sample

    240313-1a8qyshd71

  • MD5

    c6e61e1c71ffe0bfada815f3bbd030c2

  • SHA1

    b6062e39f90190afc49f9263c3d6c142463ba4b8

  • SHA256

    f107b5194dd52d81cdc4db22937344db1d77658a106095708563d9b7a250b724

  • SHA512

    5dc097d3c503a3a499623b133c7f485f4f493122cb72d0ca20f6a83a83537203de9932efb34c22fb2fc9869b1857468d6d6451d42feada9d5256aa925897333a

  • SSDEEP

    6144:PJtDhxzkeP0G5xSeZWqpJzI3e3OT9uiGKrQ:PJtDPzkiL5xSeZJpue3uuiG5

Malware Config

Extracted

Family

xtremerat

C2

kita2011.zapto.org

Ÿ杋效愨摈kita2011.zapto.org

kita2011.dyndns-ip.com

Targets

    • Target

      c6e61e1c71ffe0bfada815f3bbd030c2

    • Size

      224KB

    • MD5

      c6e61e1c71ffe0bfada815f3bbd030c2

    • SHA1

      b6062e39f90190afc49f9263c3d6c142463ba4b8

    • SHA256

      f107b5194dd52d81cdc4db22937344db1d77658a106095708563d9b7a250b724

    • SHA512

      5dc097d3c503a3a499623b133c7f485f4f493122cb72d0ca20f6a83a83537203de9932efb34c22fb2fc9869b1857468d6d6451d42feada9d5256aa925897333a

    • SSDEEP

      6144:PJtDhxzkeP0G5xSeZWqpJzI3e3OT9uiGKrQ:PJtDPzkiL5xSeZJpue3uuiG5

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Modifies Installed Components in the registry

    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks