MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 715c74876db82208d4e5b3b380dc41ba69cc9e3e4f217437359b587c2847b54f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Xtrat


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 715c74876db82208d4e5b3b380dc41ba69cc9e3e4f217437359b587c2847b54f
SHA3-384 hash: 0e3d8c11ce685c712727aedb451621e84530ef63f19d371c8469c646d623c8bff739ca7e6980d28f296d16c5e6cbf58a
SHA1 hash: 4091dab7a7d83f4b1e883b73e3724e8cfb0b856d
MD5 hash: 5b5cffd955f24faaf6a0ff21fa3bf1f0
humanhash: carolina-music-cola-carbon
File name:virussign.com_5b5cffd955f24faaf6a0ff21fa3bf1f0
Download: download sample
Signature Xtrat
File size:281'172 bytes
First seen:2022-07-13 14:19:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9c3076658fe99e27b2a5d06cd805dc7e (5 x Xtrat)
ssdeep 6144:VbeLGDvdavUJMAZ2DI0Ioi8dBNmOdT2GusIKpvVAOv/5T3Eoj7F8qibOCCwnkXc3:rDVavx3C9vXr
TLSH T1E3545EE267D51CF3CDA62B7888EFA3426739EEB186238757826844354F136C1BEC5316
TrID 46.4% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
29.5% (.EXE) Win64 Executable (generic) (10523/12/4)
12.6% (.EXE) Win32 Executable (generic) (4505/5/1)
5.6% (.EXE) Generic Win/DOS Executable (2002/3)
5.6% (.EXE) DOS Executable Generic (2000/1)
Reporter KdssSupport
Tags:exe Xtrat


Avatar
KdssSupport
Uploaded with API

Intelligence


File Origin
# of uploads :
1
# of downloads :
120
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Creating a file
Creating a process from a recently created file
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm overlay packed packed spyeye
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 664952 Sample: vzFGs4TTTF.com_5b5cffd955f2... Startdate: 15/07/2022 Architecture: WINDOWS Score: 100 62 Malicious sample detected (through community Yara rule) 2->62 64 Antivirus / Scanner detection for submitted sample 2->64 66 Multi AV Scanner detection for submitted file 2->66 68 2 other signatures 2->68 14 vzFGs4TTTF.exe 2->14         started        process3 signatures4 94 Contains functionality to inject code into remote processes 14->94 96 Tries to detect virtualization through RDTSC time measurements 14->96 98 Injects a PE file into a foreign processes 14->98 100 Contains functionality to detect sleep reduction / modifications 14->100 17 vzFGs4TTTF.exe 1 14->17         started        process5 file6 44 C:\e33bn.exe, PE32 17->44 dropped 20 e33bn.exe 17->20         started        process7 signatures8 70 Antivirus detection for dropped file 20->70 72 Machine Learning detection for dropped file 20->72 74 Tries to detect virtualization through RDTSC time measurements 20->74 76 Injects a PE file into a foreign processes 20->76 23 e33bn.exe 1 20->23         started        process9 file10 48 C:\23192p5.exe, PE32 23->48 dropped 26 23192p5.exe 23->26         started        process11 signatures12 86 Antivirus detection for dropped file 26->86 88 Machine Learning detection for dropped file 26->88 90 Tries to detect virtualization through RDTSC time measurements 26->90 92 Injects a PE file into a foreign processes 26->92 29 23192p5.exe 1 26->29         started        process13 file14 52 C:\asw0sw.exe, PE32 29->52 dropped 32 asw0sw.exe 29->32         started        process15 signatures16 54 Antivirus detection for dropped file 32->54 56 Machine Learning detection for dropped file 32->56 58 Tries to detect virtualization through RDTSC time measurements 32->58 60 Injects a PE file into a foreign processes 32->60 35 asw0sw.exe 1 32->35         started        process17 file18 46 C:\dj3ji01.exe, PE32 35->46 dropped 38 dj3ji01.exe 35->38         started        process19 signatures20 78 Antivirus detection for dropped file 38->78 80 Machine Learning detection for dropped file 38->80 82 Tries to detect virtualization through RDTSC time measurements 38->82 84 Injects a PE file into a foreign processes 38->84 41 dj3ji01.exe 1 38->41         started        process21 file22 50 C:\ln77g.exe, PE32 41->50 dropped
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-07-09 17:17:00 UTC
File Type:
PE (Exe)
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
715c74876db82208d4e5b3b380dc41ba69cc9e3e4f217437359b587c2847b54f
MD5 hash:
5b5cffd955f24faaf6a0ff21fa3bf1f0
SHA1 hash:
4091dab7a7d83f4b1e883b73e3724e8cfb0b856d
Detections:
win_extreme_rat_w1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:reverse_http
Author:CD_R0M_
Description:Identify strings with http reversed (ptth)
Rule name:win_extreme_rat_w1
Author:Seth Hardy <seth.hardy@utoronto.ca>
Description:XtremeRAT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Xtrat

Executable exe 715c74876db82208d4e5b3b380dc41ba69cc9e3e4f217437359b587c2847b54f

(this sample)

  
Delivery method
Distributed via web download

Comments