General

  • Target

    6356715227aeb1c1fbab6f5b69388b60d232a1da1d43482005ab9dc921c951d6N.exe

  • Size

    774KB

  • Sample

    250225-ek5w6asqz9

  • MD5

    fe6a1764c59f31781be6b1e57452c670

  • SHA1

    781902703d795b7cec3c3c9d3af67a6f28ca4a93

  • SHA256

    6356715227aeb1c1fbab6f5b69388b60d232a1da1d43482005ab9dc921c951d6

  • SHA512

    fbdc62f4b8612379dfd8350c0d866ee81c9e4f2e1f65422e3f96645f48e90d6a84010d4c31448aa49e971250cfad1d723d76a8362ec19ab46b166f0c5f262252

  • SSDEEP

    12288:Mgf5vlC5jqBwGDd5qUs0LcRrW//ElahUhB5xPi1vCzO0A06b7MP+Dd2k5:MuYqBwGBwmck4xhB5xPDzrI7MP+h2A

Malware Config

Targets

    • Target

      6356715227aeb1c1fbab6f5b69388b60d232a1da1d43482005ab9dc921c951d6N.exe

    • Size

      774KB

    • MD5

      fe6a1764c59f31781be6b1e57452c670

    • SHA1

      781902703d795b7cec3c3c9d3af67a6f28ca4a93

    • SHA256

      6356715227aeb1c1fbab6f5b69388b60d232a1da1d43482005ab9dc921c951d6

    • SHA512

      fbdc62f4b8612379dfd8350c0d866ee81c9e4f2e1f65422e3f96645f48e90d6a84010d4c31448aa49e971250cfad1d723d76a8362ec19ab46b166f0c5f262252

    • SSDEEP

      12288:Mgf5vlC5jqBwGDd5qUs0LcRrW//ElahUhB5xPi1vCzO0A06b7MP+Dd2k5:MuYqBwGBwmck4xhB5xPDzrI7MP+h2A

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks