General
-
Target
6039394ac00064c62d54f4c7c58eb8bd182ef5e6d3c253356db89050f9baf84e.exe
-
Size
1.4MB
-
Sample
250217-jncf8swlax
-
MD5
58ad5ce4b66d3f5c5ede5c1752dfbfd0
-
SHA1
0b65a204336b35edca74627c8ddd9de5b84382c3
-
SHA256
6039394ac00064c62d54f4c7c58eb8bd182ef5e6d3c253356db89050f9baf84e
-
SHA512
4bddaeb70044744febd657392e3870e0b5ef748a955eb71de2167106b645440278946994600e88b6d4d1484e70a51b644c543f9c3a48d3a55636a17add72f143
-
SSDEEP
24576:7xRRtXc2uqRePccDXfZak5hSg0f6AsEwmHfy5yWgjT3NvIrf1ajRumgTaI2W:rz6uaDRN5hSg0f6AxwmHf2gjT3Bi1ajs
Static task
static1
Behavioral task
behavioral1
Sample
6039394ac00064c62d54f4c7c58eb8bd182ef5e6d3c253356db89050f9baf84e.exe
Resource
win7-20241010-en
Malware Config
Extracted
xtremerat
stoya.no-ip.biz
Targets
-
-
Target
6039394ac00064c62d54f4c7c58eb8bd182ef5e6d3c253356db89050f9baf84e.exe
-
Size
1.4MB
-
MD5
58ad5ce4b66d3f5c5ede5c1752dfbfd0
-
SHA1
0b65a204336b35edca74627c8ddd9de5b84382c3
-
SHA256
6039394ac00064c62d54f4c7c58eb8bd182ef5e6d3c253356db89050f9baf84e
-
SHA512
4bddaeb70044744febd657392e3870e0b5ef748a955eb71de2167106b645440278946994600e88b6d4d1484e70a51b644c543f9c3a48d3a55636a17add72f143
-
SSDEEP
24576:7xRRtXc2uqRePccDXfZak5hSg0f6AsEwmHfy5yWgjT3NvIrf1ajRumgTaI2W:rz6uaDRN5hSg0f6AxwmHf2gjT3Bi1ajs
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1