General

  • Target

    3f70e09fe604097562ff56e3b621509f35ff89c3d1a269dcfb1d4acb20e25e69

  • Size

    45KB

  • Sample

    250221-21dtyatr12

  • MD5

    03e5986033aa68470a670fa4b5c9d5b0

  • SHA1

    b7a9627351c8d836c4154bf97566c2a0eb1c4c22

  • SHA256

    3f70e09fe604097562ff56e3b621509f35ff89c3d1a269dcfb1d4acb20e25e69

  • SHA512

    d2229887a534610b56617b2ab51c4dd7ff8f6003e064bb43f94600187f03121f90dc0a28d091edcc4af0cd76e043521e3a80a29aebff697e853cf160ecde191a

  • SSDEEP

    768:9Br+tjFYw0iY6W1jwmDzKgEFQXtklmIAnH8hwfOgw0clzova:jyRW31jxPEFQXtk0H84bIova

Malware Config

Targets

    • Target

      3f70e09fe604097562ff56e3b621509f35ff89c3d1a269dcfb1d4acb20e25e69

    • Size

      45KB

    • MD5

      03e5986033aa68470a670fa4b5c9d5b0

    • SHA1

      b7a9627351c8d836c4154bf97566c2a0eb1c4c22

    • SHA256

      3f70e09fe604097562ff56e3b621509f35ff89c3d1a269dcfb1d4acb20e25e69

    • SHA512

      d2229887a534610b56617b2ab51c4dd7ff8f6003e064bb43f94600187f03121f90dc0a28d091edcc4af0cd76e043521e3a80a29aebff697e853cf160ecde191a

    • SSDEEP

      768:9Br+tjFYw0iY6W1jwmDzKgEFQXtklmIAnH8hwfOgw0clzova:jyRW31jxPEFQXtk0H84bIova

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

MITRE ATT&CK Enterprise v15

Tasks