General

  • Target

    6960a9cfa9f4c532b79d904f291d3f1d_JaffaCakes118

  • Size

    720KB

  • Sample

    240523-cfajcahh55

  • MD5

    6960a9cfa9f4c532b79d904f291d3f1d

  • SHA1

    b9c41e156046374a8c17a71ed0cb8f32aea1187d

  • SHA256

    1f33af5ca8c0246f9e766a4f61adeabb1832635c0550de6c408d5ceae673e08d

  • SHA512

    3f918b758e0a585f434f060190bfac04f1180fb7b614e167e2437521cd97705cf33ac807ec88507f152a82b1b212db8e4849118d80345074a991e2100725d4e2

  • SSDEEP

    3072:9pHoKNh6hrlGKBKQh++xgeqy7yqceMsA61WWK0+KA889kRg7tODjQwutTihtFvZS:eC0Zz0wMnyZ

Malware Config

Extracted

Family

xtremerat

C2

x6.no-ip.info

Targets

    • Target

      6960a9cfa9f4c532b79d904f291d3f1d_JaffaCakes118

    • Size

      720KB

    • MD5

      6960a9cfa9f4c532b79d904f291d3f1d

    • SHA1

      b9c41e156046374a8c17a71ed0cb8f32aea1187d

    • SHA256

      1f33af5ca8c0246f9e766a4f61adeabb1832635c0550de6c408d5ceae673e08d

    • SHA512

      3f918b758e0a585f434f060190bfac04f1180fb7b614e167e2437521cd97705cf33ac807ec88507f152a82b1b212db8e4849118d80345074a991e2100725d4e2

    • SSDEEP

      3072:9pHoKNh6hrlGKBKQh++xgeqy7yqceMsA61WWK0+KA889kRg7tODjQwutTihtFvZS:eC0Zz0wMnyZ

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Tasks