Details
Robot
FileName
Malware Family Xtreme
Date Added 2019-03-08 06:25:16
MD5 e1455bd50fedec09b6817ad6bedca5bc
Sha256 f7ca3515710afe3eae8f9fc9c9ec75109cc93672b124abbd6e96fa2dde64f48e
Robot Robots lovingly delivered by robohash.org
Advertising
C2 Data
Install Dir System32
FTP Server ftp.ftpserver.com
Domain18 :0
Domain2 zekinhareidelas.ddns.net:82
Custom Reg Value $
Domain15 :0
Domain8 :0
Custom Reg Key HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Domain3 :0
Domain17 :0
Domain5 :0
Domain1 zekinhareidelas.ddns.net:81
Domain9 :0
Domain13 :0
HKLM ests
FTP Folder
Domain6 :0
Domain12 :0
Custom Reg Name HKCU
ActiveX Key {RD2B5FL4-E5RT-Y8M7-AEPD-0O3Q33OSA5GJ}
Injection %DEFAULTBROWSER%
Domain14 :0
Group Servers
Domain19 :0
Install Name svchost.exe
Domain20 :0
Version 2.9
Mutex 0GudNRQbtPJDw
HKCU test
FTP Password
Domain10 :0
Domain11 :0
ID Server
Domain16 :0
FTP UserName ftpuser
Domain4 :0
Domain7 :0
Virustotal

56 out of 69 AV Engines identified the sample as Malicious.

Virustotal Report

C2 Information
Domain FQDN IP Country Code
ddns.net cometdb.ddns.net 128.199.50.200 SG