General

  • Target

    6196d8bf2371c90de428c0a2e9e40d43_JaffaCakes118

  • Size

    26KB

  • Sample

    240721-11ynnsxbpf

  • MD5

    6196d8bf2371c90de428c0a2e9e40d43

  • SHA1

    83e61314c2b2d945fb5cb22240847c311a9412f1

  • SHA256

    c24723eba53a955a3ac2abffdc3d1e5848234efd06e6352a7d34b82182c5da3c

  • SHA512

    5a26afc2a4dd4f09bd5da30270484930b6f746e2949a1d6ba7458518261955b7918c135190be9e045c0105ea10cb9b24cf47ef26e55c311c0db9b569c6265b86

  • SSDEEP

    384:Lpj7eNmfp+UrM8j3Mk8mw2Qwz9cEVWNuOuuOYPq8P9iYwbzuOhgHYJxXHr3:mmfpbM8j8wQwz9caAuxYyuwhE2x

Malware Config

Extracted

Family

xtremerat

C2

bykanunsuzboy.no-ip.biz

Targets

    • Target

      6196d8bf2371c90de428c0a2e9e40d43_JaffaCakes118

    • Size

      26KB

    • MD5

      6196d8bf2371c90de428c0a2e9e40d43

    • SHA1

      83e61314c2b2d945fb5cb22240847c311a9412f1

    • SHA256

      c24723eba53a955a3ac2abffdc3d1e5848234efd06e6352a7d34b82182c5da3c

    • SHA512

      5a26afc2a4dd4f09bd5da30270484930b6f746e2949a1d6ba7458518261955b7918c135190be9e045c0105ea10cb9b24cf47ef26e55c311c0db9b569c6265b86

    • SSDEEP

      384:Lpj7eNmfp+UrM8j3Mk8mw2Qwz9cEVWNuOuuOYPq8P9iYwbzuOhgHYJxXHr3:mmfpbM8j8wQwz9caAuxYyuwhE2x

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks