Behavioral task
behavioral1
Sample
da23d1b2f06e219f028548cc2823aa4c2b251f5513f8502d82337c3acfcd5c82.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
da23d1b2f06e219f028548cc2823aa4c2b251f5513f8502d82337c3acfcd5c82.exe
Resource
win10v2004-20240226-en
General
-
Target
da23d1b2f06e219f028548cc2823aa4c2b251f5513f8502d82337c3acfcd5c82.exe
-
Size
304KB
-
MD5
1192821d7e46a8b4ca5a3be98f93c809
-
SHA1
bfdc242a6ae77af10bb2b3e30d49269767a1a196
-
SHA256
da23d1b2f06e219f028548cc2823aa4c2b251f5513f8502d82337c3acfcd5c82
-
SHA512
56878ace9b58f9578f1f875ab935959771213ea1fbfc5a3d5be0f653492c4e05bc41e45e8229d8d96b1e5653b50e7a5831d8e16e6df1df81ad7f72ee4d6a4d5b
-
SSDEEP
768:K9m1Sq4NQkrBsH1U8z05DeeQuMVTyN8ipHo37Vmd6AeXVtWAJ+BJzv+S3MgyRAR0:nsq+Q1aZQuIyJp0mgA+FJ4LEAbL
Malware Config
Extracted
xtremerat
hackercool.zapto.org
Signatures
-
Detect XtremeRAT payload 1 IoCs
Processes:
resource yara_rule sample family_xtremerat -
Xtremerat family
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource da23d1b2f06e219f028548cc2823aa4c2b251f5513f8502d82337c3acfcd5c82.exe
Files
-
da23d1b2f06e219f028548cc2823aa4c2b251f5513f8502d82337c3acfcd5c82.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE