General

  • Target

    8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118

  • Size

    141KB

  • Sample

    240811-xrgr1sxfjg

  • MD5

    8b9c17b3fc345f633a97ac7d610d0767

  • SHA1

    1358821b1b308e22cbb45a6e5406f319ffbae206

  • SHA256

    7618d79974d531e449c2e3074dbb985d1e541214810c747162750df517def4bd

  • SHA512

    fa0c1bb7ebb092c6b04dd8276e6a3260df50bdefdbd16ec754a22b5e26e784aaca4e5d2e903f1157c347d0731a97df041020a90d3ae515b07298bb593d1fc3b7

  • SSDEEP

    3072:ZdJhuS+pryw7RSPJlZsvBtjoRi0XvDrW1cq3:9L+pryw7RSPJUDjcnLm

Malware Config

Extracted

Family

xtremerat

C2

besbous.no-ip.info

Targets

    • Target

      8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118

    • Size

      141KB

    • MD5

      8b9c17b3fc345f633a97ac7d610d0767

    • SHA1

      1358821b1b308e22cbb45a6e5406f319ffbae206

    • SHA256

      7618d79974d531e449c2e3074dbb985d1e541214810c747162750df517def4bd

    • SHA512

      fa0c1bb7ebb092c6b04dd8276e6a3260df50bdefdbd16ec754a22b5e26e784aaca4e5d2e903f1157c347d0731a97df041020a90d3ae515b07298bb593d1fc3b7

    • SSDEEP

      3072:ZdJhuS+pryw7RSPJlZsvBtjoRi0XvDrW1cq3:9L+pryw7RSPJUDjcnLm

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks