General

  • Target

    4bf9add46dda1210bcee973d9bf0b8df605c53a9dda0a51bab6967f007f74570.exe

  • Size

    437KB

  • Sample

    250204-vmh36stjgw

  • MD5

    18f04c2f005278d06c0fc31d58f1f932

  • SHA1

    a77eeddaccd2cd65f4bd0296c7144f7c51b5465c

  • SHA256

    4bf9add46dda1210bcee973d9bf0b8df605c53a9dda0a51bab6967f007f74570

  • SHA512

    78cad9d92a506c0aad2f141b15c6c41fb03327ffc4649eed5fb51758a15a7afda5ee2b5a8f4a1b726a9bd4baae2b98267f244e8f41c2cd737ab6965dd136b495

  • SSDEEP

    6144:7+gfX21hzSxL4MTdxAre2yHVmJc8usCuaTT5fixVqFFbnVDnqr8se0dn8J07S:6m21hzSKUDhHU5xaTpix+VDnqw30V8p

Malware Config

Extracted

Family

xtremerat

C2

aimenutchiwa.no-ip.org

ƺ B2ະ㼺貭 aimenutchiwa2.no-ip.org

aimenutchiwa3.no-ip.org

Targets

    • Target

      4bf9add46dda1210bcee973d9bf0b8df605c53a9dda0a51bab6967f007f74570.exe

    • Size

      437KB

    • MD5

      18f04c2f005278d06c0fc31d58f1f932

    • SHA1

      a77eeddaccd2cd65f4bd0296c7144f7c51b5465c

    • SHA256

      4bf9add46dda1210bcee973d9bf0b8df605c53a9dda0a51bab6967f007f74570

    • SHA512

      78cad9d92a506c0aad2f141b15c6c41fb03327ffc4649eed5fb51758a15a7afda5ee2b5a8f4a1b726a9bd4baae2b98267f244e8f41c2cd737ab6965dd136b495

    • SSDEEP

      6144:7+gfX21hzSxL4MTdxAre2yHVmJc8usCuaTT5fixVqFFbnVDnqr8se0dn8J07S:6m21hzSKUDhHU5xaTpix+VDnqw30V8p

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks