Statements (31)
| Predicate | Object | 
|---|---|
| gptkbp:instanceOf | gptkb:Remote_Access_Trojan | 
| gptkbp:alsoKnownAs | Xtreme Remote Access Trojan | 
| gptkbp:category | gptkb:malware | 
| gptkbp:controls | Command and Control server | 
| gptkbp:detects | gptkb:security | 
| gptkbp:developedBy | unidentified developer | 
| gptkbp:distributedBy | phishing emails malicious attachments exploit kits | 
| gptkbp:features | file transfer screen capture microphone access webcam access keylogging password theft remote shell | 
| gptkbp:firstAppearance | 2010 | 
| gptkbp:notableEvent | attacks on government agencies Syrian government surveillance attacks on private companies | 
| gptkbp:platform | gptkb:Microsoft_Windows | 
| gptkbp:status | still active in the wild | 
| gptkbp:usedFor | gptkb:cybercrime data theft remote control of infected computers | 
| gptkbp:usesMalware | gptkb:Trojan Remote Access Tool | 
| gptkbp:writtenBy | gptkb:Delphi | 
| gptkbp:bfsParent | gptkb:APT25 | 
| gptkbp:bfsLayer | 8 | 
| https://www.w3.org/2000/01/rdf-schema#label | Xtreme RAT |