General

  • Target

    5ce13cf935b88f59ffaf854858e9b55d_JaffaCakes118

  • Size

    214KB

  • Sample

    241019-qtypzsydjg

  • MD5

    5ce13cf935b88f59ffaf854858e9b55d

  • SHA1

    af842a04fd799d417c0d5c0ccf90399c06a30614

  • SHA256

    ba803ae0bda7b0de5f5e0d8a987e9259bb7d3fd064c90b7dbb88f6b973a6f840

  • SHA512

    14907e28f2fd0eafc451bf878022c8afa761b8ffd952dda969bbd87db00ac2f1223cc2a62a978d073f735717525772d88af5e3174313b9a6c14bc2cef27a306b

  • SSDEEP

    6144:0aKypn+aCP0vdZhhL0MTd3MyI2JrvCidMa:0alWPCZHBd3MyI29vr

Malware Config

Extracted

Family

xtremerat

C2

demone2011.no-ip.org

Targets

    • Target

      5ce13cf935b88f59ffaf854858e9b55d_JaffaCakes118

    • Size

      214KB

    • MD5

      5ce13cf935b88f59ffaf854858e9b55d

    • SHA1

      af842a04fd799d417c0d5c0ccf90399c06a30614

    • SHA256

      ba803ae0bda7b0de5f5e0d8a987e9259bb7d3fd064c90b7dbb88f6b973a6f840

    • SHA512

      14907e28f2fd0eafc451bf878022c8afa761b8ffd952dda969bbd87db00ac2f1223cc2a62a978d073f735717525772d88af5e3174313b9a6c14bc2cef27a306b

    • SSDEEP

      6144:0aKypn+aCP0vdZhhL0MTd3MyI2JrvCidMa:0alWPCZHBd3MyI29vr

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks