General

  • Target

    788523e08316e2eebb7495d875fff849ceb5a52932b24bd4fa1fd0702a885971.exe

  • Size

    420KB

  • Sample

    241205-b1gbysxmcj

  • MD5

    181183e03d22f28ab11be4fea8a2f4f8

  • SHA1

    ce1bee4f17cf2dc38dc82d75b625ed1a0b58c72c

  • SHA256

    788523e08316e2eebb7495d875fff849ceb5a52932b24bd4fa1fd0702a885971

  • SHA512

    10064d5d443ac10f874f5294d34f6ce6ce5d2d352c89b344587c197a3479df24827966ee00fd6194da67caefd7e1f67a5d8a7a0f121c64abbb82e71bbfba85ee

  • SSDEEP

    6144:4+9hS3kbFRQqzfz7qeEzDSZbFm2A2g2McTrDLKmc:XMkHzfz77b62McTOmc

Malware Config

Extracted

Family

xtremerat

C2

sam-of.myq-see.com

Desktopsam-of.publicvm.com

Targets

    • Target

      788523e08316e2eebb7495d875fff849ceb5a52932b24bd4fa1fd0702a885971.exe

    • Size

      420KB

    • MD5

      181183e03d22f28ab11be4fea8a2f4f8

    • SHA1

      ce1bee4f17cf2dc38dc82d75b625ed1a0b58c72c

    • SHA256

      788523e08316e2eebb7495d875fff849ceb5a52932b24bd4fa1fd0702a885971

    • SHA512

      10064d5d443ac10f874f5294d34f6ce6ce5d2d352c89b344587c197a3479df24827966ee00fd6194da67caefd7e1f67a5d8a7a0f121c64abbb82e71bbfba85ee

    • SSDEEP

      6144:4+9hS3kbFRQqzfz7qeEzDSZbFm2A2g2McTrDLKmc:XMkHzfz77b62McTOmc

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks