General

  • Target

    6abe27f5fb28b360152fb6dc7f521d64_JaffaCakes118

  • Size

    4.3MB

  • Sample

    240523-m88lysea4v

  • MD5

    6abe27f5fb28b360152fb6dc7f521d64

  • SHA1

    c29253502e7799a4468c569ea907cfa4d2852b62

  • SHA256

    4331fd03d4281b82c3be8dcee3d53559ecb824e1bfdf4d86475c795ac209f0d0

  • SHA512

    7b505b00b38b6dc088a771946f1a1f4b4d732503ba45b4c085e0f84a179ceb3225019480b51289d37bc4612b01e317167660bf5ca5f139edae45a0f215e75b32

  • SSDEEP

    49152:IF0Mm2cTlxddiX12EOC3OTe44A8xXiHFjCuf0J1d7H8BummLm/fj8/zkGT/dZ91F:IFBmc

Malware Config

Extracted

Family

xtremerat

C2

mongtrelgo.hopto.org

Extracted

Family

lokibot

C2

http://hydeoutent.com/app/Panel/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      6abe27f5fb28b360152fb6dc7f521d64_JaffaCakes118

    • Size

      4.3MB

    • MD5

      6abe27f5fb28b360152fb6dc7f521d64

    • SHA1

      c29253502e7799a4468c569ea907cfa4d2852b62

    • SHA256

      4331fd03d4281b82c3be8dcee3d53559ecb824e1bfdf4d86475c795ac209f0d0

    • SHA512

      7b505b00b38b6dc088a771946f1a1f4b4d732503ba45b4c085e0f84a179ceb3225019480b51289d37bc4612b01e317167660bf5ca5f139edae45a0f215e75b32

    • SSDEEP

      49152:IF0Mm2cTlxddiX12EOC3OTe44A8xXiHFjCuf0J1d7H8BummLm/fj8/zkGT/dZ91F:IFBmc

    • AdWind

      A Java-based RAT family operated as malware-as-a-service.

    • Class file contains resources related to AdWind

    • Detect XtremeRAT payload

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • UAC bypass

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

3
T1547.001

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

5
T1112

File and Directory Permissions Modification

1
T1222

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Impact

Inhibit System Recovery

1
T1490

Tasks