General

  • Target

    20f133856ae31bea21cd93705cce4b8ebaf39a059f850fb94c6ec93575843d79

  • Size

    47KB

  • Sample

    240414-yfcjlabg64

  • MD5

    f0a4a5cecd66eacf37825a49cc1b990a

  • SHA1

    4170977cf9336251171530c2a88e5469ebdaf381

  • SHA256

    20f133856ae31bea21cd93705cce4b8ebaf39a059f850fb94c6ec93575843d79

  • SHA512

    2204da7866afcdb19a0e763ef373265869a20916f0d9593e59bcb100cbc8cc31d143d9950f281fa3a85c5d2dc2e06c27be26631dca9e9ea04c35440801cb0b76

  • SSDEEP

    768:nE9hghdN12Ozhiow2Gkm6+c3//UxC9POXxzovy:nu+zMOlw2GkmS3TWXZo

Malware Config

Targets

    • Target

      20f133856ae31bea21cd93705cce4b8ebaf39a059f850fb94c6ec93575843d79

    • Size

      47KB

    • MD5

      f0a4a5cecd66eacf37825a49cc1b990a

    • SHA1

      4170977cf9336251171530c2a88e5469ebdaf381

    • SHA256

      20f133856ae31bea21cd93705cce4b8ebaf39a059f850fb94c6ec93575843d79

    • SHA512

      2204da7866afcdb19a0e763ef373265869a20916f0d9593e59bcb100cbc8cc31d143d9950f281fa3a85c5d2dc2e06c27be26631dca9e9ea04c35440801cb0b76

    • SSDEEP

      768:nE9hghdN12Ozhiow2Gkm6+c3//UxC9POXxzovy:nu+zMOlw2GkmS3TWXZo

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks