SYMBOLCOMMON_NAMEaka. SYNONYMS
win.extreme_rat (Back to overview)

Xtreme RAT

aka: ExtRat

Actor(s): Molerats

URLhaus      

There is no description at this point.

References
2020SecureworksSecureWorks
@online{secureworks:2020:aluminum:af22ffd, author = {SecureWorks}, title = {{ALUMINUM SARATOGA}}, date = {2020}, organization = {Secureworks}, url = {https://www.secureworks.com/research/threat-profiles/aluminum-saratoga}, language = {English}, urldate = {2020-05-23} } ALUMINUM SARATOGA
BlackShades DarkComet Xtreme RAT Poison Ivy Quasar RAT Molerats
2017-08-02RSA LinkAhmed Sonbol
@online{sonbol:20170802:malspam:d849b12, author = {Ahmed Sonbol}, title = {{Malspam delivers Xtreme RAT 8-1-2017}}, date = {2017-08-02}, organization = {RSA Link}, url = {https://community.rsa.com/community/products/netwitness/blog/2017/08/02/malspam-delivers-xtreme-rat-8-1-2017}, language = {English}, urldate = {2020-01-13} } Malspam delivers Xtreme RAT 8-1-2017
Xtreme RAT
2015-12-08The CitizenlabJohn Scott-Railton, Morgan Marquis-Boire, Claudio Guarnieri, Marion Marschalek
@online{scottrailton:20151208:packrat:5f9bffa, author = {John Scott-Railton and Morgan Marquis-Boire and Claudio Guarnieri and Marion Marschalek}, title = {{Packrat: Seven Years of a South American Threat Actor}}, date = {2015-12-08}, organization = {The Citizenlab}, url = {https://citizenlab.ca/2015/12/packrat-report/}, language = {English}, urldate = {2020-05-18} } Packrat: Seven Years of a South American Threat Actor
AdWind Adzok CyberGate Xtreme RAT Packrat
2015-12-03SymantecSymantec Security Response
@online{response:20151203:colombians:04e7e8a, author = {Symantec Security Response}, title = {{Colombians major target of email campaigns delivering Xtreme RAT}}, date = {2015-12-03}, organization = {Symantec}, url = {https://www.symantec.com/connect/blogs/colombians-major-target-email-campaigns-delivering-xtreme-rat}, language = {English}, urldate = {2020-01-08} } Colombians major target of email campaigns delivering Xtreme RAT
Xtreme RAT
2014-02-19FireEyeNart Villeneuve, James T. Bennett
@online{villeneuve:20140219:xtremerat:53e1a83, author = {Nart Villeneuve and James T. Bennett}, title = {{XtremeRAT: Nuisance or Threat?}}, date = {2014-02-19}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2014/02/xtremerat-nuisance-or-threat.html}, language = {English}, urldate = {2019-12-20} } XtremeRAT: Nuisance or Threat?
Xtreme RAT
2012-07-22Malware.luMalware.lu
@online{malwarelu:20120722:xtreme:ada355e, author = {Malware.lu}, title = {{Xtreme RAT analysis}}, date = {2012-07-22}, organization = {Malware.lu}, url = {https://malware.lu/articles/2012/07/22/xtreme-rat-analysis.html}, language = {English}, urldate = {2020-01-08} } Xtreme RAT analysis
Xtreme RAT
Yara Rules
[TLP:WHITE] win_extreme_rat_auto (20200529 | autogenerated rule brought to you by yara-signator)
rule win_extreme_rat_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-05-30"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.4.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.extreme_rat"
        malpedia_rule_date = "20200529"
        malpedia_hash = "92c362319514e5a6da26204961446caa3a8b32a8"
        malpedia_version = "20200529"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 752e 8b17 b8???????? e8???????? 85c0 7e1e }
            // n = 6, score = 300
            //   752e                 | jne                 0x30
            //   8b17                 | mov                 edx, dword ptr [edi]
            //   b8????????           |                     
            //   e8????????           |                     
            //   85c0                 | test                eax, eax
            //   7e1e                 | jle                 0x20

        $sequence_1 = { 8b45d8 e8???????? 53 e8???????? 8a45fb }
            // n = 5, score = 300
            //   8b45d8               | mov                 eax, dword ptr [ebp - 0x28]
            //   e8????????           |                     
            //   53                   | push                ebx
            //   e8????????           |                     
            //   8a45fb               | mov                 al, byte ptr [ebp - 5]

        $sequence_2 = { c745f004000000 c745f404000000 8d45f4 50 8d45f8 50 }
            // n = 6, score = 300
            //   c745f004000000       | mov                 dword ptr [ebp - 0x10], 4
            //   c745f404000000       | mov                 dword ptr [ebp - 0xc], 4
            //   8d45f4               | lea                 eax, [ebp - 0xc]
            //   50                   | push                eax
            //   8d45f8               | lea                 eax, [ebp - 8]
            //   50                   | push                eax

        $sequence_3 = { a3???????? 46 68???????? 6a00 }
            // n = 4, score = 300
            //   a3????????           |                     
            //   46                   | inc                 esi
            //   68????????           |                     
            //   6a00                 | push                0

        $sequence_4 = { 89442404 eb1a a1???????? 0b05???????? }
            // n = 4, score = 300
            //   89442404             | mov                 dword ptr [esp + 4], eax
            //   eb1a                 | jmp                 0x1c
            //   a1????????           |                     
            //   0b05????????         |                     

        $sequence_5 = { 6a03 6a00 6a01 6800000080 a1???????? }
            // n = 5, score = 300
            //   6a03                 | push                3
            //   6a00                 | push                0
            //   6a01                 | push                1
            //   6800000080           | push                0x80000000
            //   a1????????           |                     

        $sequence_6 = { 40 7512 66ba2f00 8bc3 e8???????? 40 0f84a6000000 }
            // n = 7, score = 300
            //   40                   | inc                 eax
            //   7512                 | jne                 0x14
            //   66ba2f00             | mov                 dx, 0x2f
            //   8bc3                 | mov                 eax, ebx
            //   e8????????           |                     
            //   40                   | inc                 eax
            //   0f84a6000000         | je                  0xac

        $sequence_7 = { 46 3bc3 77f1 668b03 6683f820 7797 8bc3 }
            // n = 7, score = 300
            //   46                   | inc                 esi
            //   3bc3                 | cmp                 eax, ebx
            //   77f1                 | ja                  0xfffffff3
            //   668b03               | mov                 ax, word ptr [ebx]
            //   6683f820             | cmp                 ax, 0x20
            //   7797                 | ja                  0xffffff99
            //   8bc3                 | mov                 eax, ebx

        $sequence_8 = { 8d8534feffff 50 6a00 6a00 6a04 6a00 }
            // n = 6, score = 300
            //   8d8534feffff         | lea                 eax, [ebp - 0x1cc]
            //   50                   | push                eax
            //   6a00                 | push                0
            //   6a00                 | push                0
            //   6a04                 | push                4
            //   6a00                 | push                0

        $sequence_9 = { e8???????? 8bd8 eb3f e8???????? }
            // n = 4, score = 300
            //   e8????????           |                     
            //   8bd8                 | mov                 ebx, eax
            //   eb3f                 | jmp                 0x41
            //   e8????????           |                     

    condition:
        7 of them and filesize < 925696
}
[TLP:WHITE] win_extreme_rat_w0   (20170517 | Xtrem RAT v3.5)
rule win_extreme_rat_w0 {
	meta:
		author = "Jean-Philippe Teissier / @Jipe_"
		description = "Xtrem RAT v3.5"
		date = "2012-07-12" 
		version = "1.0" 
		filetype = "memory"
		source = "https://github.com/mattulm/sfiles_yara/blob/master/malware/xTremRat.yar"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.extreme_rat"
        malpedia_version = "20170517"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

	strings:
		$a = "XTREME" wide
		$b = "XTREMEBINDER" wide
		$c = "STARTSERVERBUFFER" wide
		$d = "SOFTWARE\\XtremeRAT" wide
		$e = "XTREMEUPDATE" wide
		$f = "XtremeKeylogger" wide
		$g = "myversion|3.5" wide
		$h = "xtreme rat" wide nocase
	condition:
		2 of them
}
[TLP:WHITE] win_extreme_rat_w1   (20170517 | XtremeRAT)
rule win_extreme_rat_w1 {
    meta:
        description = "XtremeRAT"
        author = "Seth Hardy <seth.hardy@utoronto.ca>"
        last_modified = "2014-07-09"
		source = "https://github.com/mattulm/sfiles_yara/blob/master/malware/xTremRat.yar"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.extreme_rat"
        malpedia_version = "20170517"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    
    strings:
        // call; fstp st
        $code1 = { E8 ?? ?? ?? ?? DD D8 }
        // hiding string
        $code2 = { C6 85 ?? ?? ?? ?? 4D C6 85 ?? ?? ?? ?? 70 C6 85 ?? ?? ?? ?? 64 C6 85 ?? ?? ?? ?? 62 C6 85 ?? ?? ?? ?? 6D }
        $str1 = "dqsaazere"
        $str2 = "-GCCLIBCYGMING-EH-TDM1-SJLJ-GTHR-MINGW32"
        
    condition:
       all of ($code*) or any of ($str*)
}
Download all Yara Rules