General

  • Target

    38b669df3f3a51a5ce0dd141a19de0d6_JaffaCakes118

  • Size

    224KB

  • Sample

    240711-mbacwsvbrf

  • MD5

    38b669df3f3a51a5ce0dd141a19de0d6

  • SHA1

    cd310c3e3184563aca04247e8b0e4bad52d59afa

  • SHA256

    bd8424634eda899174218c06ee9b2acadc5bad281304b0c07956d1936b71f5bd

  • SHA512

    31cba57e29f269672c9cdcd2dd16591836e864c374bd27a04cc8dbc877de04a74a26c537141e967dd4ba001c24d327042ee7eb7b729ee619727500211899a4ab

  • SSDEEP

    3072:WRYMAYZeeiY5iq4pu+IzauYBeWIk6uTeX2d5fYW5D+/oOUaQJ6cZESAn8ornHKKL:XYZeeQIaQWzjlB65O6y8rqKdq6D

Malware Config

Extracted

Family

xtremerat

C2

besbous.no-ip.info

Targets

    • Target

      38b669df3f3a51a5ce0dd141a19de0d6_JaffaCakes118

    • Size

      224KB

    • MD5

      38b669df3f3a51a5ce0dd141a19de0d6

    • SHA1

      cd310c3e3184563aca04247e8b0e4bad52d59afa

    • SHA256

      bd8424634eda899174218c06ee9b2acadc5bad281304b0c07956d1936b71f5bd

    • SHA512

      31cba57e29f269672c9cdcd2dd16591836e864c374bd27a04cc8dbc877de04a74a26c537141e967dd4ba001c24d327042ee7eb7b729ee619727500211899a4ab

    • SSDEEP

      3072:WRYMAYZeeiY5iq4pu+IzauYBeWIk6uTeX2d5fYW5D+/oOUaQJ6cZESAn8ornHKKL:XYZeeQIaQWzjlB65O6y8rqKdq6D

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Molebox Virtualization software

      Detects file using Molebox Virtualization software.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks