Statements (31)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Remote Access Trojan
|
gptkbp:alsoKnownAs |
Xtreme Remote Access Trojan
|
gptkbp:category |
malware
|
gptkbp:controls |
Command and Control server
|
gptkbp:detects |
gptkb:security
|
gptkbp:developedBy |
unidentified developer
|
gptkbp:distributedBy |
phishing emails
malicious attachments exploit kits |
gptkbp:features |
file transfer
screen capture microphone access webcam access keylogging password theft remote shell |
gptkbp:firstAppearance |
2010
|
https://www.w3.org/2000/01/rdf-schema#label |
Xtreme RAT
|
gptkbp:notableEvent |
attacks on government agencies
Syrian government surveillance attacks on private companies |
gptkbp:platform |
gptkb:Microsoft_Windows
|
gptkbp:status |
still active in the wild
|
gptkbp:usedFor |
cybercrime
data theft remote control of infected computers |
gptkbp:usesMalware |
Trojan
Remote Access Tool |
gptkbp:writtenBy |
gptkb:Delphi
|
gptkbp:bfsParent |
gptkb:APT25
|
gptkbp:bfsLayer |
8
|