General

  • Target

    28c32cba3ba55a0b4a1882e2380aaeaa656f0644b2dd700874f94ae6ec652a37_NeikiAnalytics.exe

  • Size

    55KB

  • Sample

    240701-a9c58athrn

  • MD5

    04549e6c2678e97f3b00711765b9f110

  • SHA1

    e635c48c215c7f0c13cb98db14185214b403b9f2

  • SHA256

    28c32cba3ba55a0b4a1882e2380aaeaa656f0644b2dd700874f94ae6ec652a37

  • SHA512

    80245fd07af2078ea1b76f40b53761866ae34dde3bb35fe007e8acd529d49b06f75cb8b747fd6847bf8f2cb08accbabe15fd56b633b9d63905fa6edfcd446595

  • SSDEEP

    768:ouMAzLqSQ6kwATx94o0IWhWAKphMltZqgpKeC50Cwfx0mzo:XtLqSQ3w0+rIcKsw4K30K6o

Malware Config

Extracted

Family

xtremerat

C2

bloo00d.no-ip.biz

Targets

    • Target

      28c32cba3ba55a0b4a1882e2380aaeaa656f0644b2dd700874f94ae6ec652a37_NeikiAnalytics.exe

    • Size

      55KB

    • MD5

      04549e6c2678e97f3b00711765b9f110

    • SHA1

      e635c48c215c7f0c13cb98db14185214b403b9f2

    • SHA256

      28c32cba3ba55a0b4a1882e2380aaeaa656f0644b2dd700874f94ae6ec652a37

    • SHA512

      80245fd07af2078ea1b76f40b53761866ae34dde3bb35fe007e8acd529d49b06f75cb8b747fd6847bf8f2cb08accbabe15fd56b633b9d63905fa6edfcd446595

    • SSDEEP

      768:ouMAzLqSQ6kwATx94o0IWhWAKphMltZqgpKeC50Cwfx0mzo:XtLqSQ3w0+rIcKsw4K30K6o

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Active Setup

1
T1547.014

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Active Setup

1
T1547.014

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks