General
-
Target
VirusShare_0c96d62e3e3b0223c6bcab5b6c0dc304
-
Size
810KB
-
Sample
240610-qvg4mayakr
-
MD5
0c96d62e3e3b0223c6bcab5b6c0dc304
-
SHA1
c00d22b41ccf49fb266dabed707e7c0a5f17fe2f
-
SHA256
01b340ad5b3fdf3bd074a19074ec6f153057fcb6e5200794bb1919939101a6f2
-
SHA512
cb292ec2d0747ac79300e52c999af24aedf5220bffafe23929f5e82c2fa2451c36bd0277c8648f7b03b47e979958b6cc68d7496b7fabdcbe60ef9797e7a3eba3
-
SSDEEP
12288:eUIVSdouDBYZUR9oK5MnyfeXRDtU+YLU3evyo1hn6PL5eWTu3oZ:SsdAZUR9t5MgkhGl4Syon6UWC3oZ
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_0c96d62e3e3b0223c6bcab5b6c0dc304.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VirusShare_0c96d62e3e3b0223c6bcab5b6c0dc304.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
VirusShare_0c96d62e3e3b0223c6bcab5b6c0dc304
-
Size
810KB
-
MD5
0c96d62e3e3b0223c6bcab5b6c0dc304
-
SHA1
c00d22b41ccf49fb266dabed707e7c0a5f17fe2f
-
SHA256
01b340ad5b3fdf3bd074a19074ec6f153057fcb6e5200794bb1919939101a6f2
-
SHA512
cb292ec2d0747ac79300e52c999af24aedf5220bffafe23929f5e82c2fa2451c36bd0277c8648f7b03b47e979958b6cc68d7496b7fabdcbe60ef9797e7a3eba3
-
SSDEEP
12288:eUIVSdouDBYZUR9oK5MnyfeXRDtU+YLU3evyo1hn6PL5eWTu3oZ:SsdAZUR9t5MgkhGl4Syon6UWC3oZ
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-