General

  • Target

    d87bda9120de373ab47fe445b99b6298_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240910-stmzla1hqg

  • MD5

    d87bda9120de373ab47fe445b99b6298

  • SHA1

    0bb96c96b0d5ecec102a61ade898065b39f89e1a

  • SHA256

    6cd8339bef4fddc4797b25af902caa74907fc95b97c1e07ab024fd9f70d07894

  • SHA512

    314f2985929855f290ab40442570c9474f3dc9370f579ed7132a21bb41995806d99ac4ea45021058a413e784b0f88200663a35544e7a6c75a1bf2b7119a7315c

  • SSDEEP

    49152:qmFEuV35cn/aEvVUi8ZJ29SerQdbZmN1XXWJl+dK6a1r+YOpFLyqf3nCSii:qyLOifkwerWe1XXMEdvU+zF+qfSz

Malware Config

Extracted

Family

xtremerat

C2

iaficasioo.zapto.org

Targets

    • Target

      d87bda9120de373ab47fe445b99b6298_JaffaCakes118

    • Size

      2.2MB

    • MD5

      d87bda9120de373ab47fe445b99b6298

    • SHA1

      0bb96c96b0d5ecec102a61ade898065b39f89e1a

    • SHA256

      6cd8339bef4fddc4797b25af902caa74907fc95b97c1e07ab024fd9f70d07894

    • SHA512

      314f2985929855f290ab40442570c9474f3dc9370f579ed7132a21bb41995806d99ac4ea45021058a413e784b0f88200663a35544e7a6c75a1bf2b7119a7315c

    • SSDEEP

      49152:qmFEuV35cn/aEvVUi8ZJ29SerQdbZmN1XXWJl+dK6a1r+YOpFLyqf3nCSii:qyLOifkwerWe1XXMEdvU+zF+qfSz

    • AdWind

      A Java-based RAT family operated as malware-as-a-service.

    • Class file contains resources related to AdWind

    • Detect XtremeRAT payload

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • UAC bypass

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks