General

  • Target

    2d7839f3fc66dceee05dd4da03474675_JaffaCakes118

  • Size

    585KB

  • Sample

    240708-xnqwhswdqh

  • MD5

    2d7839f3fc66dceee05dd4da03474675

  • SHA1

    a831c9b8b6d33f19cd77acfedc4bd2a55989139b

  • SHA256

    e8162f1766459e6ef57b0063938da6cab886743ee5c5669233424855c8098f8f

  • SHA512

    54d64c6f6785589074b235cb06d0f80288b7e6937c2e161f7a8239686f9f3b0dc9ea237912b6f47647541cfe08bb4e552ba8810d3c0ae965e95951a9300417d3

  • SSDEEP

    6144:6aKMSD4Yuaezwp0yN90QEwuzJq/fdlGFlxhlXmEjycLT:jK3D4laoy90lefdcFlxTXmEjBL

Malware Config

Extracted

Family

xtremerat

C2

server1231.no-ip.info

Targets

    • Target

      2d7839f3fc66dceee05dd4da03474675_JaffaCakes118

    • Size

      585KB

    • MD5

      2d7839f3fc66dceee05dd4da03474675

    • SHA1

      a831c9b8b6d33f19cd77acfedc4bd2a55989139b

    • SHA256

      e8162f1766459e6ef57b0063938da6cab886743ee5c5669233424855c8098f8f

    • SHA512

      54d64c6f6785589074b235cb06d0f80288b7e6937c2e161f7a8239686f9f3b0dc9ea237912b6f47647541cfe08bb4e552ba8810d3c0ae965e95951a9300417d3

    • SSDEEP

      6144:6aKMSD4Yuaezwp0yN90QEwuzJq/fdlGFlxhlXmEjycLT:jK3D4laoy90lefdcFlxTXmEjBL

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks