General

  • Target

    8ed96363807d7af23480b717aab882d8_JaffaCakes118

  • Size

    21KB

  • Sample

    240812-qeenkawfna

  • MD5

    8ed96363807d7af23480b717aab882d8

  • SHA1

    653afcaa1564827599b130c894fefd1574cc3a23

  • SHA256

    2498bf61d13c123eb4d043c2a07674881b524a59664dd41228ec5b8cbd306eb6

  • SHA512

    f875def334ff17a95cfb751acba5fc7d0399ae5c97f351e8bb2084332ebb302aa07bdd7ab954dec172e7afb214e72e1cd869d29cda7652f0f531c0c6ea4fafc8

  • SSDEEP

    384:HIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlKpIQjLbdgjjpLR:HIsF81fG9QveLOYTe5Yi8pIgXSH

Malware Config

Extracted

Family

xtremerat

C2

damla.no-ip.biz

Targets

    • Target

      8ed96363807d7af23480b717aab882d8_JaffaCakes118

    • Size

      21KB

    • MD5

      8ed96363807d7af23480b717aab882d8

    • SHA1

      653afcaa1564827599b130c894fefd1574cc3a23

    • SHA256

      2498bf61d13c123eb4d043c2a07674881b524a59664dd41228ec5b8cbd306eb6

    • SHA512

      f875def334ff17a95cfb751acba5fc7d0399ae5c97f351e8bb2084332ebb302aa07bdd7ab954dec172e7afb214e72e1cd869d29cda7652f0f531c0c6ea4fafc8

    • SSDEEP

      384:HIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlKpIQjLbdgjjpLR:HIsF81fG9QveLOYTe5Yi8pIgXSH

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks