General
-
Target
4bf9add46dda1210bcee973d9bf0b8df605c53a9dda0a51bab6967f007f74570.exe
-
Size
437KB
-
Sample
250204-vmh36stjgw
-
MD5
18f04c2f005278d06c0fc31d58f1f932
-
SHA1
a77eeddaccd2cd65f4bd0296c7144f7c51b5465c
-
SHA256
4bf9add46dda1210bcee973d9bf0b8df605c53a9dda0a51bab6967f007f74570
-
SHA512
78cad9d92a506c0aad2f141b15c6c41fb03327ffc4649eed5fb51758a15a7afda5ee2b5a8f4a1b726a9bd4baae2b98267f244e8f41c2cd737ab6965dd136b495
-
SSDEEP
6144:7+gfX21hzSxL4MTdxAre2yHVmJc8usCuaTT5fixVqFFbnVDnqr8se0dn8J07S:6m21hzSKUDhHU5xaTpix+VDnqw30V8p
Static task
static1
Behavioral task
behavioral1
Sample
4bf9add46dda1210bcee973d9bf0b8df605c53a9dda0a51bab6967f007f74570.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
aimenutchiwa.no-ip.org
ƺB2ະ㼺貭 aimenutchiwa2.no-ip.org
aimenutchiwa3.no-ip.org
Targets
-
-
Target
4bf9add46dda1210bcee973d9bf0b8df605c53a9dda0a51bab6967f007f74570.exe
-
Size
437KB
-
MD5
18f04c2f005278d06c0fc31d58f1f932
-
SHA1
a77eeddaccd2cd65f4bd0296c7144f7c51b5465c
-
SHA256
4bf9add46dda1210bcee973d9bf0b8df605c53a9dda0a51bab6967f007f74570
-
SHA512
78cad9d92a506c0aad2f141b15c6c41fb03327ffc4649eed5fb51758a15a7afda5ee2b5a8f4a1b726a9bd4baae2b98267f244e8f41c2cd737ab6965dd136b495
-
SSDEEP
6144:7+gfX21hzSxL4MTdxAre2yHVmJc8usCuaTT5fixVqFFbnVDnqr8se0dn8J07S:6m21hzSKUDhHU5xaTpix+VDnqw30V8p
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1