General
-
Target
RNSM00322.7z
-
Size
15.7MB
-
Sample
241112-w43dtaydkq
-
MD5
2293047e776b530106663d27b04759b4
-
SHA1
1cd5184787cbe42e13c4641e8574e8f656dc7b18
-
SHA256
0ddb01e5d67d7a3c917ded3e2f285a136bf0ea03fdd966edfd32711148315d2c
-
SHA512
7894e73903802bc04d9e8e6534153e27448b157033665ed8b61017903e4b9b6a50156546664f1d9585396f3b999f157101dd8448ab71c7d02240752c79af559a
-
SSDEEP
393216:k09sG7gYyVlIrnnyE0pnq7PQr3vAcA6NwumDXUkpXd8:kDGgYyvhVqrQr3vAc43DXNd8
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00322.7z
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
mongtrelgo.hopto.org
Targets
-
-
Target
RNSM00322.7z
-
Size
15.7MB
-
MD5
2293047e776b530106663d27b04759b4
-
SHA1
1cd5184787cbe42e13c4641e8574e8f656dc7b18
-
SHA256
0ddb01e5d67d7a3c917ded3e2f285a136bf0ea03fdd966edfd32711148315d2c
-
SHA512
7894e73903802bc04d9e8e6534153e27448b157033665ed8b61017903e4b9b6a50156546664f1d9585396f3b999f157101dd8448ab71c7d02240752c79af559a
-
SSDEEP
393216:k09sG7gYyVlIrnnyE0pnq7PQr3vAcA6NwumDXUkpXd8:kDGgYyvhVqrQr3vAc43DXNd8
-
Adwind family
-
Class file contains resources related to AdWind
-
Detect XtremeRAT payload
-
Lokibot family
-
Troldesh family
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Event Triggered Execution: Image File Execution Options Injection
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1