General

  • Target

    06d309860576546e54315dc5d8d36410ae0355fef600d7af1b2f6aeb8f198682

  • Size

    226KB

  • Sample

    250412-yx6h1az1dt

  • MD5

    a8f27f786cd4cf5e1dfb3817478f23b6

  • SHA1

    97c0c92f9f394332386b93c2d93d0e7c5adef0af

  • SHA256

    06d309860576546e54315dc5d8d36410ae0355fef600d7af1b2f6aeb8f198682

  • SHA512

    1f07d6266b1ac8dcf7fbdb1b2498225c460d5b29f622f1cf5be42b262dffa8e773ebc15f78e2b18037a87c7850a80e8dddf44ebff9527c1c4ad0526f2365effb

  • SSDEEP

    3072:jZkRi4rd9GTXuI7E9n6nUaiUdLA34OS7lRT2k7jGliNuOegNKeTy3hFijXMlJE:jWRTjySnqUai1o7+0Gl21VTymjXMlJE

Malware Config

Targets

    • Target

      06d309860576546e54315dc5d8d36410ae0355fef600d7af1b2f6aeb8f198682

    • Size

      226KB

    • MD5

      a8f27f786cd4cf5e1dfb3817478f23b6

    • SHA1

      97c0c92f9f394332386b93c2d93d0e7c5adef0af

    • SHA256

      06d309860576546e54315dc5d8d36410ae0355fef600d7af1b2f6aeb8f198682

    • SHA512

      1f07d6266b1ac8dcf7fbdb1b2498225c460d5b29f622f1cf5be42b262dffa8e773ebc15f78e2b18037a87c7850a80e8dddf44ebff9527c1c4ad0526f2365effb

    • SSDEEP

      3072:jZkRi4rd9GTXuI7E9n6nUaiUdLA34OS7lRT2k7jGliNuOegNKeTy3hFijXMlJE:jWRTjySnqUai1o7+0Gl21VTymjXMlJE

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks