General

  • Target

    0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N

  • Size

    2.4MB

  • Sample

    241025-xs4cea1lgx

  • MD5

    5f4e35a011f3717d5ada9865d8867fb0

  • SHA1

    cae012e3dcffac07162c72d48f32b62db71b8759

  • SHA256

    0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61

  • SHA512

    7ec2493933cc700c216574f60070f0baaed2ce24c306ce123556bc7c149c573083290cc6f1a7e1b3ed33851a28fdcd5716a0c806d8dbe1d7d2c43a226b19182e

  • SSDEEP

    49152:VdAKs1ZTeWKH7qC2huWZYz827+doDBfEzbsDDS/BsuPYfq7DTAQ:wKs1ZTc7uQWZKb7goFfEzbsDDS/CkOuH

Malware Config

Targets

    • Target

      0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61N

    • Size

      2.4MB

    • MD5

      5f4e35a011f3717d5ada9865d8867fb0

    • SHA1

      cae012e3dcffac07162c72d48f32b62db71b8759

    • SHA256

      0f33a9d0abe2c1c7902d861e4bd8b4f419cbd431a2048cb7a17827ac7dec2e61

    • SHA512

      7ec2493933cc700c216574f60070f0baaed2ce24c306ce123556bc7c149c573083290cc6f1a7e1b3ed33851a28fdcd5716a0c806d8dbe1d7d2c43a226b19182e

    • SSDEEP

      49152:VdAKs1ZTeWKH7qC2huWZYz827+doDBfEzbsDDS/BsuPYfq7DTAQ:wKs1ZTc7uQWZKb7goFfEzbsDDS/CkOuH

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Adds policy Run key to start application

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks