General

  • Target

    290cfa288bb1366ad9c3c16772f571bd_JaffaCakes118

  • Size

    425KB

  • Sample

    241009-cqldlatbjl

  • MD5

    290cfa288bb1366ad9c3c16772f571bd

  • SHA1

    6894221c0fca1a5baff2752870c18c74a5bc99d2

  • SHA256

    58fec54f8d625d5bb7b4347d3ae06b7efe6f008db3e44b7b38cf8314c7b72fb5

  • SHA512

    a8ce71ad9a5a304f7f33869610645a85f78f2ad1d61995ffea757024193130d294bcb871b3021fb66e4bec6582a9312cc60d80ae533ee65df26b935711f0f538

  • SSDEEP

    12288:y2u4sum+hlTEqUZoYX+KdC3R+kFifVucdSSEc:GKmGlTEZo8eRpFifMtc

Malware Config

Extracted

Family

xtremerat

C2

eminn115.zapto.org

Targets

    • Target

      290cfa288bb1366ad9c3c16772f571bd_JaffaCakes118

    • Size

      425KB

    • MD5

      290cfa288bb1366ad9c3c16772f571bd

    • SHA1

      6894221c0fca1a5baff2752870c18c74a5bc99d2

    • SHA256

      58fec54f8d625d5bb7b4347d3ae06b7efe6f008db3e44b7b38cf8314c7b72fb5

    • SHA512

      a8ce71ad9a5a304f7f33869610645a85f78f2ad1d61995ffea757024193130d294bcb871b3021fb66e4bec6582a9312cc60d80ae533ee65df26b935711f0f538

    • SSDEEP

      12288:y2u4sum+hlTEqUZoYX+KdC3R+kFifVucdSSEc:GKmGlTEZo8eRpFifMtc

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks