General

  • Target

    66d6bab5c56a9cf6167077a97334a3c8_JaffaCakes118

  • Size

    533KB

  • Sample

    240522-lrj2laba81

  • MD5

    66d6bab5c56a9cf6167077a97334a3c8

  • SHA1

    f0e954d37d356b8240d9e5278cbb72591370b434

  • SHA256

    255f5a92f6d426254f7fdf56f9940855914b50516e94b1e6cab2af9a5a7d625e

  • SHA512

    3894a2414c3fe810bf64affd4ddb424389c41d619cb209fbf343f20d5d79776c47274322458e3c4ad57f56dd40c9e5dba439d6ae8ee3a966cdb601a5221c0cfc

  • SSDEEP

    12288:8lzr1LIHeIeTFZEWkQxxKR8ndHPU0ASyNItfb0KZIO:8trD1TKQxPP1AKtj0HO

Malware Config

Extracted

Family

xtremerat

C2

ali00.ddns.net

Targets

    • Target

      كركل كروم.exe

    • Size

      1.8MB

    • MD5

      2e591b7018d1b289707e487a096a4f86

    • SHA1

      1c8ce2c64944e9f56ed72f8f1314115bf4aa7b15

    • SHA256

      5c9428ade02a7ad9a3d887b8c244ae962c8891daa2446077345649f82da87d2c

    • SHA512

      ef32df169f9deeb26e45580cbdbb7fe16b78d6d456bcadafdc536c97a4e5a05ede4c616c1bf94473d7d4f2dbf0889065640c48190bc48302081cbae40ea9dbcd

    • SSDEEP

      24576:kB4Uzr6UeRmmZg8ADHWsJuFfo5jYbYzHSG/UpnMUnFz3Y/l0:Xw+

    • Detect Neshta payload

    • Detect XtremeRAT payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks