General

  • Target

    5b6c8f94e010372362d33fb1a7aa48d0_JaffaCakes118

  • Size

    44KB

  • Sample

    240519-zqzybahd99

  • MD5

    5b6c8f94e010372362d33fb1a7aa48d0

  • SHA1

    07e5730b1eb163cd9f5fd38e7b3b0c64e78975b8

  • SHA256

    aba9c3a8f1d9688fa4db346dfc06a38f15ea7eba23bf5bbc5b61fda23d9c6cb5

  • SHA512

    2ab6527348fe5fa3e908328c7821119349a8583bad4420df1802433ad67c4b24bf5516449dff67a35141b2edce976ca5434af92346808ce2d2c4bab9319cb27c

  • SSDEEP

    768:BBr+tjFqTPkAlfztB1lr6an3smTA8uvm2MjCpP21zoCdq:nyRUHlrL1lr6an3TLuvm25MoSq

Malware Config

Extracted

Family

xtremerat

C2

warcriminal.servemp3.com

Targets

    • Target

      5b6c8f94e010372362d33fb1a7aa48d0_JaffaCakes118

    • Size

      44KB

    • MD5

      5b6c8f94e010372362d33fb1a7aa48d0

    • SHA1

      07e5730b1eb163cd9f5fd38e7b3b0c64e78975b8

    • SHA256

      aba9c3a8f1d9688fa4db346dfc06a38f15ea7eba23bf5bbc5b61fda23d9c6cb5

    • SHA512

      2ab6527348fe5fa3e908328c7821119349a8583bad4420df1802433ad67c4b24bf5516449dff67a35141b2edce976ca5434af92346808ce2d2c4bab9319cb27c

    • SSDEEP

      768:BBr+tjFqTPkAlfztB1lr6an3smTA8uvm2MjCpP21zoCdq:nyRUHlrL1lr6an3TLuvm25MoSq

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks