General

  • Target

    821d80f825671cb06fed6630b7877c2e5896c48689a56271db294ee3fb62bb84

  • Size

    324KB

  • Sample

    250115-eajwya1rak

  • MD5

    7ad28dbdd3fe54ac38835e29f72ba2cf

  • SHA1

    95d91c3fd70005cb0a7472e37726b73deea4a436

  • SHA256

    821d80f825671cb06fed6630b7877c2e5896c48689a56271db294ee3fb62bb84

  • SHA512

    a19a9ccb628f11bb7b1ecefc0ff41ac4a70f3f09544362e856c3d7f5a7ef579d9a1f31acc5599438f85b307fbdab7c7f5417a4173f9db699e5abf36ef2be7ae3

  • SSDEEP

    6144:QQZcZt6IlrCS1GuhAmUaLYeJj/8TD/TPcTzhTfMTqVTxRTCb/0QZG9DzkvduWZ0G:tZcuS1GlmUaLYeJj/8P/Lc3hbMWV1RWP

Malware Config

Extracted

Family

xtremerat

C2

wwwwwww.zapto.org

Targets

    • Target

      821d80f825671cb06fed6630b7877c2e5896c48689a56271db294ee3fb62bb84

    • Size

      324KB

    • MD5

      7ad28dbdd3fe54ac38835e29f72ba2cf

    • SHA1

      95d91c3fd70005cb0a7472e37726b73deea4a436

    • SHA256

      821d80f825671cb06fed6630b7877c2e5896c48689a56271db294ee3fb62bb84

    • SHA512

      a19a9ccb628f11bb7b1ecefc0ff41ac4a70f3f09544362e856c3d7f5a7ef579d9a1f31acc5599438f85b307fbdab7c7f5417a4173f9db699e5abf36ef2be7ae3

    • SSDEEP

      6144:QQZcZt6IlrCS1GuhAmUaLYeJj/8TD/TPcTzhTfMTqVTxRTCb/0QZG9DzkvduWZ0G:tZcuS1GlmUaLYeJj/8P/Lc3hbMWV1RWP

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks