General

  • Target

    fd6b9a4e42648347bcfcdeb2d5e7f4b602364d22d70dcf79f1bdbf4722af96a6.exe

  • Size

    192KB

  • Sample

    241204-lgfles1phs

  • MD5

    0725580895dbf96decb73d2347c1bfc7

  • SHA1

    714a98668b4a18ee2e65711f2d835a14feaabee8

  • SHA256

    fd6b9a4e42648347bcfcdeb2d5e7f4b602364d22d70dcf79f1bdbf4722af96a6

  • SHA512

    18824d545374946fadfa2efc1a7f4137c5a7a131fa582cd177a61932f36f19ddaed1f4addf2e9971bec9c4151c00028956f83fac4e227264ea396bd3cccba03f

  • SSDEEP

    6144:H4FF5HbInVW5GJZ2tNYLj8MfsimYwYdlSk:H4+VzYKj86sgR1

Malware Config

Targets

    • Target

      fd6b9a4e42648347bcfcdeb2d5e7f4b602364d22d70dcf79f1bdbf4722af96a6.exe

    • Size

      192KB

    • MD5

      0725580895dbf96decb73d2347c1bfc7

    • SHA1

      714a98668b4a18ee2e65711f2d835a14feaabee8

    • SHA256

      fd6b9a4e42648347bcfcdeb2d5e7f4b602364d22d70dcf79f1bdbf4722af96a6

    • SHA512

      18824d545374946fadfa2efc1a7f4137c5a7a131fa582cd177a61932f36f19ddaed1f4addf2e9971bec9c4151c00028956f83fac4e227264ea396bd3cccba03f

    • SSDEEP

      6144:H4FF5HbInVW5GJZ2tNYLj8MfsimYwYdlSk:H4+VzYKj86sgR1

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks