General

  • Target

    e388050c5f04c03e6a256da3ca301433_JaffaCakes118

  • Size

    775KB

  • Sample

    240406-3crxbsef88

  • MD5

    e388050c5f04c03e6a256da3ca301433

  • SHA1

    73e6a7881fa9448d4b3c3a6fd629a7f5b72a4295

  • SHA256

    93d5c61502be2d10ab68e6faa675609ab41dd8b4ec4afba589f6ef9799ba004f

  • SHA512

    b07017c503e8509a2858d0550d24d6a79796f7eb34edfc179ee2ee7a54739d23af2a15260f329f698ee8d2bf9e1c5dd8df8bdf35684233d8f1dc2fc6338c68c9

  • SSDEEP

    12288:8dIasG+o0eY7YGAZ5lWIasG+o0eY7YGAZ5l:8aasDodmY9JasDodmY9

Malware Config

Extracted

Family

xtremerat

C2

mosad.xro.tzo.net

Targets

    • Target

      e388050c5f04c03e6a256da3ca301433_JaffaCakes118

    • Size

      775KB

    • MD5

      e388050c5f04c03e6a256da3ca301433

    • SHA1

      73e6a7881fa9448d4b3c3a6fd629a7f5b72a4295

    • SHA256

      93d5c61502be2d10ab68e6faa675609ab41dd8b4ec4afba589f6ef9799ba004f

    • SHA512

      b07017c503e8509a2858d0550d24d6a79796f7eb34edfc179ee2ee7a54739d23af2a15260f329f698ee8d2bf9e1c5dd8df8bdf35684233d8f1dc2fc6338c68c9

    • SSDEEP

      12288:8dIasG+o0eY7YGAZ5lWIasG+o0eY7YGAZ5l:8aasDodmY9JasDodmY9

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Modifies Installed Components in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks