General
-
Target
18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe
-
Size
62KB
-
Sample
241127-he1l2aynel
-
MD5
81150067656989d2e2811d08fdcd7d80
-
SHA1
5c61ed1e8ac0c787e590067d5e0953ca499f88bd
-
SHA256
18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37
-
SHA512
74e9c63cac3b60c01463e655304212255be7d0db88896225deac3ed0eb211f7977603c194937dbfb55bf1532d8b8531999b576c3f347002cf3db3c33e70a2324
-
SSDEEP
1536:b8qS+OLPjNW71rGYDAWeotvXllSTeoJ9s4hxajeNbFF2:bk+OL7NW7zEvotvX/6egu4KUbP2
Static task
static1
Behavioral task
behavioral1
Sample
18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37N.exe
-
Size
62KB
-
MD5
81150067656989d2e2811d08fdcd7d80
-
SHA1
5c61ed1e8ac0c787e590067d5e0953ca499f88bd
-
SHA256
18134d44f9e32e9333e9b42ff2be7311400784f0a5c467e2dcb07127cefafe37
-
SHA512
74e9c63cac3b60c01463e655304212255be7d0db88896225deac3ed0eb211f7977603c194937dbfb55bf1532d8b8531999b576c3f347002cf3db3c33e70a2324
-
SSDEEP
1536:b8qS+OLPjNW71rGYDAWeotvXllSTeoJ9s4hxajeNbFF2:bk+OL7NW7zEvotvX/6egu4KUbP2
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-