General

  • Target

    4270d63cbc42a090f6b2129b16ae00c2_JaffaCakes118

  • Size

    469KB

  • Sample

    240514-wt3xlaaa85

  • MD5

    4270d63cbc42a090f6b2129b16ae00c2

  • SHA1

    1f7c0b59e9430b052e2cfd892236e7fc7f669190

  • SHA256

    c5f915bce4baabc66f1a79fd321ea84d22c8abeb8319f20d7ba38860064b9bd9

  • SHA512

    7cefcd2b89ba573456b13297510b1ba960a45da2b43c675a92dc89191e9e9ca3ceb30ad9c67a4eef335b9bf888ab82468baddce34b8d447526670e4a6e9a083a

  • SSDEEP

    12288:OsxKdJPsDfsTC8GdOs52XCsfEVzJADW1FtvwMzcw/CsC:Osc6LTkBXCRzJIW1FtYMzhC

Malware Config

Extracted

Family

xtremerat

C2

rfefef.duckdns.org

Targets

    • Target

      TRANSACION EXITOSA REALIZADA DETALLE DE PAGO -12321-432-5432-IMG5432jhgf5432.exe

    • Size

      1.1MB

    • MD5

      0394db81257ce589a1019605c93cdf80

    • SHA1

      7dbd22f4a77a1570c323c1954bbeea71a1da225c

    • SHA256

      0e6464c8f4b60eff44a75b6c5f74efe1fa607fbd267d3ea80442f95f33625407

    • SHA512

      a17131611bf238b060383cff1760797f2144064de0ec98976579190f95bcc8717bb69657b0229a2150f81fbad6c0825f89c9c2cd9dd6e995fa7d7d44298cb5c6

    • SSDEEP

      12288:Otb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaJjOLyOJSpq6A:Otb20pkaCqT5TBWgNQ7aZOXYpq6A

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Modifies Installed Components in the registry

    • Drops startup file

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks