Behavioral task
behavioral1
Sample
417249ab8378c4af7b7f96efc58ad8cba2150976155b366d38bd77ef07bc8c60.exe
Resource
win7-20241010-en
General
-
Target
417249ab8378c4af7b7f96efc58ad8cba2150976155b366d38bd77ef07bc8c60.exe
-
Size
301KB
-
MD5
ec6f37578e79f2858c3a156203495e42
-
SHA1
560367d291991f4f5600f79d96b717426c9a067d
-
SHA256
417249ab8378c4af7b7f96efc58ad8cba2150976155b366d38bd77ef07bc8c60
-
SHA512
8fc740a7dafaab1660f2998146e5ec31b75c0aba9d4dfb653b3a242ba24d1219d614564e3282f73fd34f56c70953698340c278e19fb20ddc8196fa4a044eb4a6
-
SSDEEP
768:d8m1Sq4NQErBsH1tzoisBKQI6dObAG/dq8uW29Ifnca/yyR+P2ujfGiin0/4PIS0:Zsq+QV4rObAdXWpf/y+T0GyVox0
Malware Config
Signatures
-
Detect XtremeRAT payload 1 IoCs
Processes:
resource yara_rule sample family_xtremerat -
Xtremerat family
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 417249ab8378c4af7b7f96efc58ad8cba2150976155b366d38bd77ef07bc8c60.exe
Files
-
417249ab8378c4af7b7f96efc58ad8cba2150976155b366d38bd77ef07bc8c60.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE