General

  • Target

    77de8b45e2883165fc3ed4d5dd351a1c7134ef343e10e488266e26bfc0e4284b.exe

  • Size

    62KB

  • Sample

    241127-rh2syasrfk

  • MD5

    b485e46d22d35ca5736de271bcd05462

  • SHA1

    ba5cb6434ee5102556e2199bb2fc2c93f3b70082

  • SHA256

    77de8b45e2883165fc3ed4d5dd351a1c7134ef343e10e488266e26bfc0e4284b

  • SHA512

    543cc1fa543fdedd50f344e7bafb86c841f15ae5a36dd714cb69b4a4cb76fd4583261073dd0a379c713cf77ffdb93909d6292ffbff684eb98044030b52c91029

  • SSDEEP

    1536:b8qS+OLPjNW71rGYDAWeotvXllSTeoJ9s4hxajeNbFF2t:bk+OL7NW7zEvotvX/6egu4KUbP2t

Malware Config

Targets

    • Target

      77de8b45e2883165fc3ed4d5dd351a1c7134ef343e10e488266e26bfc0e4284b.exe

    • Size

      62KB

    • MD5

      b485e46d22d35ca5736de271bcd05462

    • SHA1

      ba5cb6434ee5102556e2199bb2fc2c93f3b70082

    • SHA256

      77de8b45e2883165fc3ed4d5dd351a1c7134ef343e10e488266e26bfc0e4284b

    • SHA512

      543cc1fa543fdedd50f344e7bafb86c841f15ae5a36dd714cb69b4a4cb76fd4583261073dd0a379c713cf77ffdb93909d6292ffbff684eb98044030b52c91029

    • SSDEEP

      1536:b8qS+OLPjNW71rGYDAWeotvXllSTeoJ9s4hxajeNbFF2t:bk+OL7NW7zEvotvX/6egu4KUbP2t

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks