General

  • Target

    672a8fca53d99c0c9e9402061018507d0d05f670548ea675441d1a232d0ca320.exe

  • Size

    248KB

  • Sample

    250107-ypd4saxrek

  • MD5

    0138d319a76965e25bc48d8244c2ccf7

  • SHA1

    e03fdf949bcc3c96abd897b4008c4ca7c4d4a332

  • SHA256

    672a8fca53d99c0c9e9402061018507d0d05f670548ea675441d1a232d0ca320

  • SHA512

    2e1e3fb376093431c1c3a6b8282c6ac328925880124df7a49fa13f272e1826047239058eda5b6210233f4fa695be87ba42f03a7491ed82c9ff9da416b215c193

  • SSDEEP

    3072:2pQjMB7q0pvVT3oKSDHmCh1ot3rtAypzFi+cpm7spchKH0JuBQw8HpPt8oWJRMHD:dP0T7oKuHVet3JAYC29wUlt8nJWHD

Malware Config

Targets

    • Target

      672a8fca53d99c0c9e9402061018507d0d05f670548ea675441d1a232d0ca320.exe

    • Size

      248KB

    • MD5

      0138d319a76965e25bc48d8244c2ccf7

    • SHA1

      e03fdf949bcc3c96abd897b4008c4ca7c4d4a332

    • SHA256

      672a8fca53d99c0c9e9402061018507d0d05f670548ea675441d1a232d0ca320

    • SHA512

      2e1e3fb376093431c1c3a6b8282c6ac328925880124df7a49fa13f272e1826047239058eda5b6210233f4fa695be87ba42f03a7491ed82c9ff9da416b215c193

    • SSDEEP

      3072:2pQjMB7q0pvVT3oKSDHmCh1ot3rtAypzFi+cpm7spchKH0JuBQw8HpPt8oWJRMHD:dP0T7oKuHVet3JAYC29wUlt8nJWHD

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks