General

  • Target

    5b2e858e6e789d4f8862a5c5b89d9d2f_JaffaCakes118

  • Size

    35KB

  • Sample

    241019-gqrb3a1brh

  • MD5

    5b2e858e6e789d4f8862a5c5b89d9d2f

  • SHA1

    9e69cd0062990c37988e5072681a129a9bb7aa8c

  • SHA256

    fb1675c99fed97b50ce3f5f8c9112e168c1d526c56c4d9445582b6774a82f8b9

  • SHA512

    e851f72934cd5945efcabccb1934bf648fa6a6e7ecd04b2b2d4dca5fe9ed83a4721a35864dc8fcc8d33577e48648aaee1500a6d88b5390b277ee58bfa96706bf

  • SSDEEP

    768:ZEG2Wr4T91a6i4BZSeCC5StddRFtpf720fAWiGwxrbPr:Z7qNZWC5SNPAWid

Malware Config

Extracted

Family

xtremerat

C2

momoscd.redirectme.net

Targets

    • Target

      5b2e858e6e789d4f8862a5c5b89d9d2f_JaffaCakes118

    • Size

      35KB

    • MD5

      5b2e858e6e789d4f8862a5c5b89d9d2f

    • SHA1

      9e69cd0062990c37988e5072681a129a9bb7aa8c

    • SHA256

      fb1675c99fed97b50ce3f5f8c9112e168c1d526c56c4d9445582b6774a82f8b9

    • SHA512

      e851f72934cd5945efcabccb1934bf648fa6a6e7ecd04b2b2d4dca5fe9ed83a4721a35864dc8fcc8d33577e48648aaee1500a6d88b5390b277ee58bfa96706bf

    • SSDEEP

      768:ZEG2Wr4T91a6i4BZSeCC5StddRFtpf720fAWiGwxrbPr:Z7qNZWC5SNPAWid

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks