General

  • Target

    160c91accd909de4a3a96d6b23bf3528_JaffaCakes118

  • Size

    92KB

  • Sample

    241005-ed8z8stfjl

  • MD5

    160c91accd909de4a3a96d6b23bf3528

  • SHA1

    31314e319c34e4db29632f81d6908e8713549a43

  • SHA256

    8d42e581b2cb71c69985020506b79434f58bebb43759e2cf2693ef9f47364ace

  • SHA512

    4f6048f8f34f1c9968010b5c7dd88df46c0a1b39595ddf756169e5472061e6a25dec0aef2cc9a5b8706c86cfe22d0db6cd85ec98f5906bfcb0ad2a611bad1599

  • SSDEEP

    1536:prPsJQ0JRYWTW1kPCwDylaP5f6Ccd3jj9Gq+26sdsUQ1iY0eHP/:VD0JRYWiqPZfP5Edzj97+26nUpTCH

Malware Config

Extracted

Family

xtremerat

C2

benzouine.no-ip.biz

Targets

    • Target

      160c91accd909de4a3a96d6b23bf3528_JaffaCakes118

    • Size

      92KB

    • MD5

      160c91accd909de4a3a96d6b23bf3528

    • SHA1

      31314e319c34e4db29632f81d6908e8713549a43

    • SHA256

      8d42e581b2cb71c69985020506b79434f58bebb43759e2cf2693ef9f47364ace

    • SHA512

      4f6048f8f34f1c9968010b5c7dd88df46c0a1b39595ddf756169e5472061e6a25dec0aef2cc9a5b8706c86cfe22d0db6cd85ec98f5906bfcb0ad2a611bad1599

    • SSDEEP

      1536:prPsJQ0JRYWTW1kPCwDylaP5f6Ccd3jj9Gq+26sdsUQ1iY0eHP/:VD0JRYWiqPZfP5Edzj97+26nUpTCH

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks