General
-
Target
910b204d21b084ca360e999dc7b8c62c8f7ab03d1fabb144403ded43a254e7dd.exe
-
Size
21KB
-
Sample
241218-3mx64axqbk
-
MD5
999d79780ce646ec198a48fe71cca237
-
SHA1
84e361373cf278e28f63abfab62ca4820e28c481
-
SHA256
910b204d21b084ca360e999dc7b8c62c8f7ab03d1fabb144403ded43a254e7dd
-
SHA512
020f5e9b4cabccde35feb867f3f6208dcb80f2a4235058e047576300e1d9c72b69dbf39e6de1e5a61396c6d20bed54df147ac25822a70e5802c83d8880e08c93
-
SSDEEP
384:PIdmF+TH95xJMu/0PlxjV8BINhuLJ37tMOpuqqz3KK7eIVmhvYndM5SLP5pLRb:PIsF8HdbKjV8BX7Vy6K7eIVaAndEKPlb
Behavioral task
behavioral1
Sample
910b204d21b084ca360e999dc7b8c62c8f7ab03d1fabb144403ded43a254e7dd.exe
Resource
win7-20240729-en
Malware Config
Extracted
xtremerat
hackermeker.no-ip.biz
Targets
-
-
Target
910b204d21b084ca360e999dc7b8c62c8f7ab03d1fabb144403ded43a254e7dd.exe
-
Size
21KB
-
MD5
999d79780ce646ec198a48fe71cca237
-
SHA1
84e361373cf278e28f63abfab62ca4820e28c481
-
SHA256
910b204d21b084ca360e999dc7b8c62c8f7ab03d1fabb144403ded43a254e7dd
-
SHA512
020f5e9b4cabccde35feb867f3f6208dcb80f2a4235058e047576300e1d9c72b69dbf39e6de1e5a61396c6d20bed54df147ac25822a70e5802c83d8880e08c93
-
SSDEEP
384:PIdmF+TH95xJMu/0PlxjV8BINhuLJ37tMOpuqqz3KK7eIVmhvYndM5SLP5pLRb:PIsF8HdbKjV8BX7Vy6K7eIVaAndEKPlb
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Deletes itself
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1