MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9d66fc7b5542b1c4308c05b0daddfd3982557763f5786f75adaab31038f30be1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Xtrat


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 9d66fc7b5542b1c4308c05b0daddfd3982557763f5786f75adaab31038f30be1
SHA3-384 hash: c99e831642963f0399f26554d15dc42f20c107ec9188ced652bf4b208553a85cc006b589ae5b19d7491edb56279e96b7
SHA1 hash: 5ff7563ec14fa8f59c8d94f077a33da345ae7561
MD5 hash: 5ace990314aad994419e71baf919a150
humanhash: california-skylark-glucose-maryland
File name:virussign.com_5ace990314aad994419e71baf919a150
Download: download sample
Signature Xtrat
File size:281'866 bytes
First seen:2022-07-13 14:18:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9c3076658fe99e27b2a5d06cd805dc7e (5 x Xtrat)
ssdeep 6144:VbeLGDvdavUJMAZ2DI0Ioi8dBNmOdT2GusIKpvVAOv/5T3Eoj7F8qibOCCwnkXcv:rDVavx3C9vD
TLSH T1C3545EE267D51CF3CDA62B7888EFA3426739EEB186238757826844354F136C17EC9316
TrID 46.4% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
29.5% (.EXE) Win64 Executable (generic) (10523/12/4)
12.6% (.EXE) Win32 Executable (generic) (4505/5/1)
5.6% (.EXE) Generic Win/DOS Executable (2002/3)
5.6% (.EXE) DOS Executable Generic (2000/1)
Reporter KdssSupport
Tags:exe Xtrat


Avatar
KdssSupport
Uploaded with API

Intelligence


File Origin
# of uploads :
1
# of downloads :
114
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Creating a file
Creating a process from a recently created file
Sending a custom TCP request
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm overlay packed packed spyeye
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 664954 Sample: 3gcfv0c76a.com_5ace990314aa... Startdate: 15/07/2022 Architecture: WINDOWS Score: 100 62 Malicious sample detected (through community Yara rule) 2->62 64 Antivirus / Scanner detection for submitted sample 2->64 66 Multi AV Scanner detection for submitted file 2->66 68 2 other signatures 2->68 14 3gcfv0c76a.exe 2->14         started        process3 signatures4 94 Contains functionality to inject code into remote processes 14->94 96 Tries to detect virtualization through RDTSC time measurements 14->96 98 Injects a PE file into a foreign processes 14->98 100 Contains functionality to detect sleep reduction / modifications 14->100 17 3gcfv0c76a.exe 1 14->17         started        process5 file6 44 C:\07c95.exe, PE32 17->44 dropped 20 07c95.exe 17->20         started        process7 signatures8 70 Antivirus detection for dropped file 20->70 72 Machine Learning detection for dropped file 20->72 74 Tries to detect virtualization through RDTSC time measurements 20->74 76 Injects a PE file into a foreign processes 20->76 23 07c95.exe 1 20->23         started        process9 file10 48 C:\516753.exe, PE32 23->48 dropped 26 516753.exe 23->26         started        process11 signatures12 86 Antivirus detection for dropped file 26->86 88 Machine Learning detection for dropped file 26->88 90 Tries to detect virtualization through RDTSC time measurements 26->90 92 Injects a PE file into a foreign processes 26->92 29 516753.exe 1 26->29         started        process13 file14 52 C:\g4fi9.exe, PE32 29->52 dropped 32 g4fi9.exe 29->32         started        process15 signatures16 54 Antivirus detection for dropped file 32->54 56 Machine Learning detection for dropped file 32->56 58 Tries to detect virtualization through RDTSC time measurements 32->58 60 Injects a PE file into a foreign processes 32->60 35 g4fi9.exe 1 32->35         started        process17 file18 46 C:\9ru738.exe, PE32 35->46 dropped 38 9ru738.exe 35->38         started        process19 signatures20 78 Antivirus detection for dropped file 38->78 80 Machine Learning detection for dropped file 38->80 82 Tries to detect virtualization through RDTSC time measurements 38->82 84 Injects a PE file into a foreign processes 38->84 41 9ru738.exe 1 38->41         started        process21 file22 50 C:\43ioxq.exe, PE32 41->50 dropped
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-07-08 16:55:00 UTC
File Type:
PE (Exe)
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
9d66fc7b5542b1c4308c05b0daddfd3982557763f5786f75adaab31038f30be1
MD5 hash:
5ace990314aad994419e71baf919a150
SHA1 hash:
5ff7563ec14fa8f59c8d94f077a33da345ae7561
Detections:
win_extreme_rat_w1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:reverse_http
Author:CD_R0M_
Description:Identify strings with http reversed (ptth)
Rule name:win_extreme_rat_w1
Author:Seth Hardy <seth.hardy@utoronto.ca>
Description:XtremeRAT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Xtrat

Executable exe 9d66fc7b5542b1c4308c05b0daddfd3982557763f5786f75adaab31038f30be1

(this sample)

  
Delivery method
Distributed via web download

Comments