General

  • Target

    0e5376755c1de1ec0029c1392ba60a4b9fa83a83373942912a91ce1a969669ff.exe

  • Size

    21KB

  • Sample

    241216-29tazstpek

  • MD5

    0d025210f189daa46d096fd917f8260e

  • SHA1

    fd1e8618de227d893f5e3ef9aa0b001314a8c10c

  • SHA256

    0e5376755c1de1ec0029c1392ba60a4b9fa83a83373942912a91ce1a969669ff

  • SHA512

    f032432150abadded1f0aa9bcad4ee9cc52cbe78cf5f324cb9a9e5ab6229f7509249a17098cadd31ff70690351c6ece33af4e8a0265f71730057330c4da7f0a2

  • SSDEEP

    384:rqIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlEZQVb3fnVvj9hpLRz:uIsF81fG9QveLOYTe5YiyZQ3fpz

Malware Config

Extracted

Family

xtremerat

C2

viruscray.no-ip.info

Targets

    • Target

      0e5376755c1de1ec0029c1392ba60a4b9fa83a83373942912a91ce1a969669ff.exe

    • Size

      21KB

    • MD5

      0d025210f189daa46d096fd917f8260e

    • SHA1

      fd1e8618de227d893f5e3ef9aa0b001314a8c10c

    • SHA256

      0e5376755c1de1ec0029c1392ba60a4b9fa83a83373942912a91ce1a969669ff

    • SHA512

      f032432150abadded1f0aa9bcad4ee9cc52cbe78cf5f324cb9a9e5ab6229f7509249a17098cadd31ff70690351c6ece33af4e8a0265f71730057330c4da7f0a2

    • SSDEEP

      384:rqIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlEZQVb3fnVvj9hpLRz:uIsF81fG9QveLOYTe5YiyZQ3fpz

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks