General

  • Target

    43acf7653add3b6057ff2d7e9fc7c0d1_JaffaCakes118

  • Size

    87KB

  • Sample

    241014-xha8wa1ajb

  • MD5

    43acf7653add3b6057ff2d7e9fc7c0d1

  • SHA1

    ed9264bd267ab57afc2f3dda3ef4e477936efeba

  • SHA256

    b6b44e7566b9c0ee46bc62cbc2e29e3ffadc6d2fdf81d8bb70ce7006466b3b7c

  • SHA512

    7ee994885a81d16cd0cf7873a2814ac19e771b8a1e5f6a9f6b03ab875456e2a1cc130fcc376cc897d281fa7aa769ff7e1f82532585366bf482dde78266dd2dba

  • SSDEEP

    1536:tl0PS0YToPNZk56M1zYx1WIeFAYCptiPGIAskp8Qr3PLOF/SjsD9ZC6tAUS/ga9n:tAS0YTabkkM1cx1feWjqGItS8cPLOBSv

Malware Config

Extracted

Family

xtremerat

C2

adminyhk.no-ip.biz

Targets

    • Target

      43acf7653add3b6057ff2d7e9fc7c0d1_JaffaCakes118

    • Size

      87KB

    • MD5

      43acf7653add3b6057ff2d7e9fc7c0d1

    • SHA1

      ed9264bd267ab57afc2f3dda3ef4e477936efeba

    • SHA256

      b6b44e7566b9c0ee46bc62cbc2e29e3ffadc6d2fdf81d8bb70ce7006466b3b7c

    • SHA512

      7ee994885a81d16cd0cf7873a2814ac19e771b8a1e5f6a9f6b03ab875456e2a1cc130fcc376cc897d281fa7aa769ff7e1f82532585366bf482dde78266dd2dba

    • SSDEEP

      1536:tl0PS0YToPNZk56M1zYx1WIeFAYCptiPGIAskp8Qr3PLOF/SjsD9ZC6tAUS/ga9n:tAS0YTabkkM1cx1feWjqGItS8cPLOBSv

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks