General

  • Target

    3ef8d96be46a7a2f39a5fee4a544f0fc_JaffaCakes118

  • Size

    752KB

  • Sample

    240712-1f2jtstcqe

  • MD5

    3ef8d96be46a7a2f39a5fee4a544f0fc

  • SHA1

    4222846098600deae6a6f69f1cf975d720ab88b9

  • SHA256

    2684f4c46fd5aa8b5d328e231a1047340d09950c319a8ff6d88b0af244ad35c5

  • SHA512

    68f42612d6e51faba13599cc49f039bb8a97e65becdefe7d16bc894399b9f609e90066114c2f1025a29055d509f8f21e4f00072840622033da5a7326d4043a8e

  • SSDEEP

    12288:vkxDoouVA2nxKkh0vdRgQriDJOIZW+yBGQowlNCh4a31kfgjd1ANumL3FO:JRmJkqoQrilOIQ+yMxGaYgjkNumE

Malware Config

Extracted

Family

xtremerat

C2

coxihack.zapto.org

Targets

    • Target

      3ef8d96be46a7a2f39a5fee4a544f0fc_JaffaCakes118

    • Size

      752KB

    • MD5

      3ef8d96be46a7a2f39a5fee4a544f0fc

    • SHA1

      4222846098600deae6a6f69f1cf975d720ab88b9

    • SHA256

      2684f4c46fd5aa8b5d328e231a1047340d09950c319a8ff6d88b0af244ad35c5

    • SHA512

      68f42612d6e51faba13599cc49f039bb8a97e65becdefe7d16bc894399b9f609e90066114c2f1025a29055d509f8f21e4f00072840622033da5a7326d4043a8e

    • SSDEEP

      12288:vkxDoouVA2nxKkh0vdRgQriDJOIZW+yBGQowlNCh4a31kfgjd1ANumL3FO:JRmJkqoQrilOIQ+yMxGaYgjkNumE

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks