General

  • Target

    f4e819232565cee858b9ca81ba9c5321_JaffaCakes118

  • Size

    252KB

  • Sample

    240417-dpafdaca98

  • MD5

    f4e819232565cee858b9ca81ba9c5321

  • SHA1

    00b2d1282135e0bac771bb92927cf8861f83ab17

  • SHA256

    2700f8789dfefdfcd391ca9d89acd60d2cf5b49f4110c69baa04acfd3f5f9f2d

  • SHA512

    3d09181c325c2b16596a17cdf50544dcd50fe0bf1e3c38465ac49564a98794ceb97cf4892ad4055d81637a5875bc6565a8e99132c87e924da63c407cc4735732

  • SSDEEP

    6144:cvkckiRGLZZPcj0nN/G6MCaP3xmMuCKczll6:a0iRGTPKz6MtJdurV

Malware Config

Extracted

Family

xtremerat

C2

skullfire.no-ip.org

Targets

    • Target

      f4e819232565cee858b9ca81ba9c5321_JaffaCakes118

    • Size

      252KB

    • MD5

      f4e819232565cee858b9ca81ba9c5321

    • SHA1

      00b2d1282135e0bac771bb92927cf8861f83ab17

    • SHA256

      2700f8789dfefdfcd391ca9d89acd60d2cf5b49f4110c69baa04acfd3f5f9f2d

    • SHA512

      3d09181c325c2b16596a17cdf50544dcd50fe0bf1e3c38465ac49564a98794ceb97cf4892ad4055d81637a5875bc6565a8e99132c87e924da63c407cc4735732

    • SSDEEP

      6144:cvkckiRGLZZPcj0nN/G6MCaP3xmMuCKczll6:a0iRGTPKz6MtJdurV

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Tasks