General

  • Target

    2531c79089181552ccdf9b03ead86b87_JaffaCakes118

  • Size

    79KB

  • Sample

    241008-zjj9aavcll

  • MD5

    2531c79089181552ccdf9b03ead86b87

  • SHA1

    12690b1b72baab39cee5c4a7e6298416ca63b90b

  • SHA256

    e0fc93cba4229a564fb24a805f193dc1b2645acef42797892b4d4a1ad64467bd

  • SHA512

    f5afce95798a01e97dd24b55460b82832589660e423d6ef7ef07e32178e0d5a0c538fd84c767eb05c8db19d66e29b2c38c34405802911a0f977fc72fa9102ff4

  • SSDEEP

    1536:OBn+qTxEJxCme7B/QQEwRYrRdgnBipBbOOjJOqeok9uZUG:+n+qTxEKFTWtdgn4pDh5kPG

Malware Config

Extracted

Family

xtremerat

C2

configure.zapto.org

Targets

    • Target

      2531c79089181552ccdf9b03ead86b87_JaffaCakes118

    • Size

      79KB

    • MD5

      2531c79089181552ccdf9b03ead86b87

    • SHA1

      12690b1b72baab39cee5c4a7e6298416ca63b90b

    • SHA256

      e0fc93cba4229a564fb24a805f193dc1b2645acef42797892b4d4a1ad64467bd

    • SHA512

      f5afce95798a01e97dd24b55460b82832589660e423d6ef7ef07e32178e0d5a0c538fd84c767eb05c8db19d66e29b2c38c34405802911a0f977fc72fa9102ff4

    • SSDEEP

      1536:OBn+qTxEJxCme7B/QQEwRYrRdgnBipBbOOjJOqeok9uZUG:+n+qTxEKFTWtdgn4pDh5kPG

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks