General

  • Target

    6244e9424e491b4906f2e4bfc78f11b1_JaffaCakes118

  • Size

    107KB

  • Sample

    240722-h55nnsvgmk

  • MD5

    6244e9424e491b4906f2e4bfc78f11b1

  • SHA1

    4e32edc5ff67238cd81d288d07ea4ad1312e8d4f

  • SHA256

    df300d986a56574c8a7f8793416fe7f3fb9e157f6e4a911fb949749d32659e3b

  • SHA512

    ba1af94abebe8e23335b07f944d5c3766621449674cccf14234b99fe1c407d5de3c1a05bb3c28d9881195bd3d24514bd1f4c9e697b70486814d80fd6577329a1

  • SSDEEP

    3072:vcINEMu9CzG7jb+Wd0W/FpcBLQYoSWjuBxnVd:e/yGD+1upcBLQxSWWd

Malware Config

Extracted

Family

xtremerat

C2

oguzip.no-ip.biz

Targets

    • Target

      6244e9424e491b4906f2e4bfc78f11b1_JaffaCakes118

    • Size

      107KB

    • MD5

      6244e9424e491b4906f2e4bfc78f11b1

    • SHA1

      4e32edc5ff67238cd81d288d07ea4ad1312e8d4f

    • SHA256

      df300d986a56574c8a7f8793416fe7f3fb9e157f6e4a911fb949749d32659e3b

    • SHA512

      ba1af94abebe8e23335b07f944d5c3766621449674cccf14234b99fe1c407d5de3c1a05bb3c28d9881195bd3d24514bd1f4c9e697b70486814d80fd6577329a1

    • SSDEEP

      3072:vcINEMu9CzG7jb+Wd0W/FpcBLQYoSWjuBxnVd:e/yGD+1upcBLQxSWWd

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks