General

  • Target

    20bdf082026a74f1f31a5b1c12fd6763_JaffaCakes118

  • Size

    272KB

  • Sample

    241008-k53kessenc

  • MD5

    20bdf082026a74f1f31a5b1c12fd6763

  • SHA1

    4295e87724307cb40fdb1acc0471e7bfcf35cfd9

  • SHA256

    b76af5ae5caf68b5afd1f4bd5ef54b23c833960d5ce5b3f00ee66ab4b9996849

  • SHA512

    242a2913168495a3c9c3f4f5a8aa8a50217aa8351c14c8ca8052641b10252ee3e8be6cfc6e0a981e093cb6a1cea7ec718cb7192889caf266995e54f0fc13c1f7

  • SSDEEP

    3072:Uzjx6rrzaLlQsPNxffh0X27HYpN4PFX1EQ80jPvidNfDN:6k27HYf4PDs0jPvidN

Malware Config

Extracted

Family

xtremerat

C2

ssaaiq.no-ip.org

Targets

    • Target

      20bdf082026a74f1f31a5b1c12fd6763_JaffaCakes118

    • Size

      272KB

    • MD5

      20bdf082026a74f1f31a5b1c12fd6763

    • SHA1

      4295e87724307cb40fdb1acc0471e7bfcf35cfd9

    • SHA256

      b76af5ae5caf68b5afd1f4bd5ef54b23c833960d5ce5b3f00ee66ab4b9996849

    • SHA512

      242a2913168495a3c9c3f4f5a8aa8a50217aa8351c14c8ca8052641b10252ee3e8be6cfc6e0a981e093cb6a1cea7ec718cb7192889caf266995e54f0fc13c1f7

    • SSDEEP

      3072:Uzjx6rrzaLlQsPNxffh0X27HYpN4PFX1EQ80jPvidNfDN:6k27HYf4PDs0jPvidN

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks