General

  • Target

    3b7f3fcb1b8a5c40a05c2915e7042b151ccd9aab4f01a7ef4f0c24e6a6fa7519.exe

  • Size

    21KB

  • Sample

    250225-kjlpsazqx3

  • MD5

    91c499b398b7db561732d18e5acb98ac

  • SHA1

    41602166b93f59aea8cffa8c08868cf17571e161

  • SHA256

    3b7f3fcb1b8a5c40a05c2915e7042b151ccd9aab4f01a7ef4f0c24e6a6fa7519

  • SHA512

    43b12014d10715f7885e38b7c1d45d1f8b0d2a887db87bfc3be2fada26610fba7cfe8f0c441236eda4d6b13fb5e24cfac69ff3774da5276d5d8d71ed8b495535

  • SSDEEP

    384:rYIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNl3pQ4HmZHy/QoyfpLRh:UIsF81fG9QveLOYTe5YiRpQbHXbh

Malware Config

Extracted

Family

xtremerat

C2

John5698.no-ip.info

Targets

    • Target

      3b7f3fcb1b8a5c40a05c2915e7042b151ccd9aab4f01a7ef4f0c24e6a6fa7519.exe

    • Size

      21KB

    • MD5

      91c499b398b7db561732d18e5acb98ac

    • SHA1

      41602166b93f59aea8cffa8c08868cf17571e161

    • SHA256

      3b7f3fcb1b8a5c40a05c2915e7042b151ccd9aab4f01a7ef4f0c24e6a6fa7519

    • SHA512

      43b12014d10715f7885e38b7c1d45d1f8b0d2a887db87bfc3be2fada26610fba7cfe8f0c441236eda4d6b13fb5e24cfac69ff3774da5276d5d8d71ed8b495535

    • SSDEEP

      384:rYIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNl3pQ4HmZHy/QoyfpLRh:UIsF81fG9QveLOYTe5YiRpQbHXbh

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks