ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool XtremeRAT

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: XtremeRAT

NamesXtremeRAT
Xtreme RAT
ExtRat
CategoryTools
TypeBackdoor, Keylogger, Info stealer, Exfiltration
DescriptionA publicly available RAT.

(FireEye) XtremeRAT allows an attacker to:

• Interact with the victim via a remote shell
• Upload/download files
• Interact with the registry
• Manipulate running processes and services
• Capture images of the desktop
• Record from connected devices, such as a webcam or microphone

Moreover, during the build process, the attacker can specify whether to include keylogging and USB infection functions.
Information<https://www.fireeye.com/blog/threat-research/2014/02/xtremerat-nuisance-or-threat.html>
<https://community.rsa.com/community/products/netwitness/blog/2017/08/02/malspam-delivers-xtreme-rat-8-1-2017>
<https://www.symantec.com/connect/blogs/colombians-major-target-email-campaigns-delivering-xtreme-rat>
<https://malware.lu/articles/2012/07/22/xtreme-rat-analysis.html>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.extreme_rat>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:xtremerat>

Last change to this tool card: 28 December 2022

Download this tool card in JSON format

All groups using tool XtremeRAT

ChangedNameCountryObserved

APT groups

 Molerats, Extreme Jackal, Gaza Cybergang[Gaza]2012-Jul 2023 
 Packrat[Latin America]2008 
 TA558[Unknown]2018 

3 groups listed (3 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]