General
-
Target
f823db99dc639007585ee0c55ee58628955b99224bfe637e594e83a96989b790.exe
-
Size
125KB
-
Sample
241218-gtccbaxnhq
-
MD5
3800d6dd51ad7c600449b946f3a480ea
-
SHA1
415160495701503f6741232d58a0796c688e151f
-
SHA256
f823db99dc639007585ee0c55ee58628955b99224bfe637e594e83a96989b790
-
SHA512
edf76d380a98f8c1df535ef41e37bc4ca00129d8492d59837c5ecf9161121c8e406ee1e32f5c247233e68daab378f8c91d68a649d1dbf51564e9774fabe5d9a3
-
SSDEEP
3072:d0PpDmmBFH6d23ggFLnfDtcwZp6tZ1krgQte0pXNI:EFaFghpcwZp6Bk0Q13I
Static task
static1
Behavioral task
behavioral1
Sample
f823db99dc639007585ee0c55ee58628955b99224bfe637e594e83a96989b790.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
alnmroood.zapto.org
Targets
-
-
Target
f823db99dc639007585ee0c55ee58628955b99224bfe637e594e83a96989b790.exe
-
Size
125KB
-
MD5
3800d6dd51ad7c600449b946f3a480ea
-
SHA1
415160495701503f6741232d58a0796c688e151f
-
SHA256
f823db99dc639007585ee0c55ee58628955b99224bfe637e594e83a96989b790
-
SHA512
edf76d380a98f8c1df535ef41e37bc4ca00129d8492d59837c5ecf9161121c8e406ee1e32f5c247233e68daab378f8c91d68a649d1dbf51564e9774fabe5d9a3
-
SSDEEP
3072:d0PpDmmBFH6d23ggFLnfDtcwZp6tZ1krgQte0pXNI:EFaFghpcwZp6Bk0Q13I
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext
-