General

  • Target

    ac13208a40f105f511d2185b4712599a3041cd188ff18b8693d55dc74a32f692.exe

  • Size

    256KB

  • Sample

    250121-1ph4vasmby

  • MD5

    23e402752135e6088a8c7b8d2e22749d

  • SHA1

    33f88f7b9f393d8c130303f1d55d3a96564e6a32

  • SHA256

    ac13208a40f105f511d2185b4712599a3041cd188ff18b8693d55dc74a32f692

  • SHA512

    07aa02d7b6a162667e214c384a6f61bdf31421c3346dc87f2587a74daa2c1822f9a0e95f5b78d928b1b17c156303bc25be4b5ab3144b356cf31371a702c511e2

  • SSDEEP

    3072:L9rfiQUSKDtXxJGPztG1U9VhIHZ+U9yB+M1/y2tVjjPvmtgq7I:hDc1U9VhIHZ+U9yoMc0jjPvmtgp

Malware Config

Extracted

Family

xtremerat

C2

ssaaiq.no-ip.org

Targets

    • Target

      ac13208a40f105f511d2185b4712599a3041cd188ff18b8693d55dc74a32f692.exe

    • Size

      256KB

    • MD5

      23e402752135e6088a8c7b8d2e22749d

    • SHA1

      33f88f7b9f393d8c130303f1d55d3a96564e6a32

    • SHA256

      ac13208a40f105f511d2185b4712599a3041cd188ff18b8693d55dc74a32f692

    • SHA512

      07aa02d7b6a162667e214c384a6f61bdf31421c3346dc87f2587a74daa2c1822f9a0e95f5b78d928b1b17c156303bc25be4b5ab3144b356cf31371a702c511e2

    • SSDEEP

      3072:L9rfiQUSKDtXxJGPztG1U9VhIHZ+U9yB+M1/y2tVjjPvmtgq7I:hDc1U9VhIHZ+U9yoMc0jjPvmtgp

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks