Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2024 11:58

General

  • Target

    805e2e5812ae75d314a2dffa9cfee1bf294b6da97683567af10ee461e99310bfN.exe

  • Size

    81KB

  • MD5

    7d6e7347cf449c0d2344ee79c6e3f1d0

  • SHA1

    d0765fe7b18a52e47f4c38a9a705dcfbcdb2dbda

  • SHA256

    805e2e5812ae75d314a2dffa9cfee1bf294b6da97683567af10ee461e99310bf

  • SHA512

    331e043a108f1eeaca03981510f28d04d5d2a0abd6cfc74773d98cb8c94f8e8ffd8c40672846f99df3da5ff52573c725041db9c691b9ef57926c881cdbddf292

  • SSDEEP

    1536:3T8qDqQ8K9MK3tGjbNwPZ6oIeXHWTlNNX3RfEfE:DqMyKdcPeXHW5Jcs

Malware Config

Signatures

  • Detect XtremeRAT payload 1 IoCs
  • XtremeRAT

    The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

  • Xtremerat family

Processes

  • C:\Users\Admin\AppData\Local\Temp\805e2e5812ae75d314a2dffa9cfee1bf294b6da97683567af10ee461e99310bfN.exe
    "C:\Users\Admin\AppData\Local\Temp\805e2e5812ae75d314a2dffa9cfee1bf294b6da97683567af10ee461e99310bfN.exe"
    1⤵
      PID:2196

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2196-0-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB