General

  • Target

    471035a4e60b031493aa30e006de309a_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240714-2f2ehaxfqh

  • MD5

    471035a4e60b031493aa30e006de309a

  • SHA1

    9327f2dad7eb49bd681bf9a8bccaf42fc6df9cb1

  • SHA256

    aaf985bf7fd535c4d0fb5da6a12d7426ae8742bb5e73785061b7e38080f258c1

  • SHA512

    43e78ad0c431f90cd8644dee4c95d53ec8bd20c2a9d13bc4635742fa920bc15a44c186c353a12cfe9051673cf1c6d763c317e6673e957dec87abea43cc1f2e75

  • SSDEEP

    24576:vpQt/L8Fn8XM/N2MicqB8DpkI/qgDIs0ooG4Z22NwjF8C:BQls8ytI8DyIiqIfoo7w5

Malware Config

Extracted

Family

xtremerat

C2

mmsalt.no-ip.org

Targets

    • Target

      471035a4e60b031493aa30e006de309a_JaffaCakes118

    • Size

      1.2MB

    • MD5

      471035a4e60b031493aa30e006de309a

    • SHA1

      9327f2dad7eb49bd681bf9a8bccaf42fc6df9cb1

    • SHA256

      aaf985bf7fd535c4d0fb5da6a12d7426ae8742bb5e73785061b7e38080f258c1

    • SHA512

      43e78ad0c431f90cd8644dee4c95d53ec8bd20c2a9d13bc4635742fa920bc15a44c186c353a12cfe9051673cf1c6d763c317e6673e957dec87abea43cc1f2e75

    • SSDEEP

      24576:vpQt/L8Fn8XM/N2MicqB8DpkI/qgDIs0ooG4Z22NwjF8C:BQls8ytI8DyIiqIfoo7w5

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks