General

  • Target

    19087468fdde59a8f77932f8af309228_JaffaCakes118

  • Size

    69KB

  • Sample

    241006-v5s14awejp

  • MD5

    19087468fdde59a8f77932f8af309228

  • SHA1

    8f64ebd0e4f34323f94165bd2cae6f44a9108930

  • SHA256

    fad97fc5156c39d3999312b3d2931e1d7dbedefe2b93b945f1aea0500a188ade

  • SHA512

    b8fecc2a67bdb029ca2cc133aa406640c2fc1b7e7152c00e515fe04a4bd5d71a0401ecd8b0c53110d72821e8b097a44b26c4f7552278da818c6b65d5ebd62f6a

  • SSDEEP

    768:r0HsZc77k+TVhSW+gLa1pSRWYjNtI/7OYpu/lj3Yle7mW:RZc77dhfLa2jHI/7nMke7r

Malware Config

Extracted

Family

xtremerat

C2

baloobadjamel.hopto.org

Targets

    • Target

      19087468fdde59a8f77932f8af309228_JaffaCakes118

    • Size

      69KB

    • MD5

      19087468fdde59a8f77932f8af309228

    • SHA1

      8f64ebd0e4f34323f94165bd2cae6f44a9108930

    • SHA256

      fad97fc5156c39d3999312b3d2931e1d7dbedefe2b93b945f1aea0500a188ade

    • SHA512

      b8fecc2a67bdb029ca2cc133aa406640c2fc1b7e7152c00e515fe04a4bd5d71a0401ecd8b0c53110d72821e8b097a44b26c4f7552278da818c6b65d5ebd62f6a

    • SSDEEP

      768:r0HsZc77k+TVhSW+gLa1pSRWYjNtI/7OYpu/lj3Yle7mW:RZc77dhfLa2jHI/7nMke7r

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks