Statements (31)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Remote_Access_Trojan
|
| gptkbp:alsoKnownAs |
Xtreme Remote Access Trojan
|
| gptkbp:category |
gptkb:malware
|
| gptkbp:controls |
Command and Control server
|
| gptkbp:detects |
gptkb:security
|
| gptkbp:developedBy |
unidentified developer
|
| gptkbp:distributedBy |
phishing emails
malicious attachments exploit kits |
| gptkbp:features |
file transfer
screen capture microphone access webcam access keylogging password theft remote shell |
| gptkbp:firstAppearance |
2010
|
| gptkbp:notableEvent |
attacks on government agencies
Syrian government surveillance attacks on private companies |
| gptkbp:platform |
gptkb:Microsoft_Windows
|
| gptkbp:status |
still active in the wild
|
| gptkbp:usedFor |
gptkb:cybercrime
data theft remote control of infected computers |
| gptkbp:usesMalware |
gptkb:Trojan
Remote Access Tool |
| gptkbp:writtenBy |
gptkb:Delphi
|
| gptkbp:bfsParent |
gptkb:APT25
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
Xtreme RAT
|