General
-
Target
9e9fec3ff4dce17a719345d12573d1a0_JaffaCakes118
-
Size
4.4MB
-
Sample
240611-sqzh8a1gjd
-
MD5
9e9fec3ff4dce17a719345d12573d1a0
-
SHA1
9b00aac448f2578dbe3ad1fa6ad881dce088ee4f
-
SHA256
0b09172121446ef773c5a6b3e69054aa830d7d7f030b716674972c80717a65f8
-
SHA512
a40ba2f5fb8ba6dcb8f2013ac2b165ecb6d5d545da85531aa4d20a64e6577e2edd68c8dfecf1b7d9133ab2b62e99cd0ef6237d10fc76509c25b164038d37b651
-
SSDEEP
49152:BwCbthWW8/fe+sz1KDkfMSnvmc4+2ZnA2p2BUEfK5vbVQQb/ur2Z:5VQb6ZfMSvmFnBcBUE4baa/d
Malware Config
Extracted
xtremerat
jasoiuuydealoo.zapto.org
Extracted
latentbot
jasoiuuydealoo.zapto.org
Targets
-
-
Target
9e9fec3ff4dce17a719345d12573d1a0_JaffaCakes118
-
Size
4.4MB
-
MD5
9e9fec3ff4dce17a719345d12573d1a0
-
SHA1
9b00aac448f2578dbe3ad1fa6ad881dce088ee4f
-
SHA256
0b09172121446ef773c5a6b3e69054aa830d7d7f030b716674972c80717a65f8
-
SHA512
a40ba2f5fb8ba6dcb8f2013ac2b165ecb6d5d545da85531aa4d20a64e6577e2edd68c8dfecf1b7d9133ab2b62e99cd0ef6237d10fc76509c25b164038d37b651
-
SSDEEP
49152:BwCbthWW8/fe+sz1KDkfMSnvmc4+2ZnA2p2BUEfK5vbVQQb/ur2Z:5VQb6ZfMSvmFnBcBUE4baa/d
-
Class file contains resources related to AdWind
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Modifies Installed Components in the registry
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
6Scripting
1