General

  • Target

    d098421bbda191cd8f280b315b94bf6a_JaffaCakes118

  • Size

    243KB

  • Sample

    240906-2tbe8ssajl

  • MD5

    d098421bbda191cd8f280b315b94bf6a

  • SHA1

    70f4e1ffb8dc6ec629c2db1f8417cd5f6ed8803e

  • SHA256

    0119f29563c62c4cde5be8d8a1bf112204f859acf76ae4aa13a68198f899d965

  • SHA512

    5234bda0be735a12dcfb9270f8513de3ea42f10ef36a5e914031e950afe7c5e8f089ae326dffd7ad3dd181bc4ca8165cb1e0bda1b3e6e3266dedacb4137c77c6

  • SSDEEP

    3072:XFd2Afoka0uMMGYmKlMCJ+UrxkCkK9a7+Z3wCYdj8vK1HDvhk1eSkDyfCnewUmGc:1jQwuYKs7M3jvEu1nkaCneT3NmEQd

Malware Config

Extracted

Family

xtremerat

C2

umtakcicek.dyndns.org

ࠁ谀umtakcicek.dyndns.org

Targets

    • Target

      d098421bbda191cd8f280b315b94bf6a_JaffaCakes118

    • Size

      243KB

    • MD5

      d098421bbda191cd8f280b315b94bf6a

    • SHA1

      70f4e1ffb8dc6ec629c2db1f8417cd5f6ed8803e

    • SHA256

      0119f29563c62c4cde5be8d8a1bf112204f859acf76ae4aa13a68198f899d965

    • SHA512

      5234bda0be735a12dcfb9270f8513de3ea42f10ef36a5e914031e950afe7c5e8f089ae326dffd7ad3dd181bc4ca8165cb1e0bda1b3e6e3266dedacb4137c77c6

    • SSDEEP

      3072:XFd2Afoka0uMMGYmKlMCJ+UrxkCkK9a7+Z3wCYdj8vK1HDvhk1eSkDyfCnewUmGc:1jQwuYKs7M3jvEu1nkaCneT3NmEQd

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks