General

  • Target

    611c584afb9218c85e2a72c9aa87dd1c_JaffaCakes118

  • Size

    21KB

  • Sample

    241020-jltmqsxamf

  • MD5

    611c584afb9218c85e2a72c9aa87dd1c

  • SHA1

    0cdf8f22a99f96075c38ce5bfdcd6a44757d6f4a

  • SHA256

    c9f499fb4b8e30669c51e80f2ebe98a6686ccd54069066b74dd9f1a0e9eb01c6

  • SHA512

    54eb49b345dda2e267babaf1d1a15fc0b55e28be47c3e2d6a2cb40fbba1c7d77b6db44e4e6869c2a532092c90093ed8c0c8f2f205b61a7a2879204e830d0d92f

  • SSDEEP

    384:AIdmF+TH95xJMu/0PlxjV8BINhuLJ37tMOpuqqz3KK7eIVmiM1QdaKxqEpLR:AIsF8HdbKjV8BX7Vy6K7eIVTAQdSE

Malware Config

Extracted

Family

xtremerat

C2

uranio.no-ip.biz

Targets

    • Target

      611c584afb9218c85e2a72c9aa87dd1c_JaffaCakes118

    • Size

      21KB

    • MD5

      611c584afb9218c85e2a72c9aa87dd1c

    • SHA1

      0cdf8f22a99f96075c38ce5bfdcd6a44757d6f4a

    • SHA256

      c9f499fb4b8e30669c51e80f2ebe98a6686ccd54069066b74dd9f1a0e9eb01c6

    • SHA512

      54eb49b345dda2e267babaf1d1a15fc0b55e28be47c3e2d6a2cb40fbba1c7d77b6db44e4e6869c2a532092c90093ed8c0c8f2f205b61a7a2879204e830d0d92f

    • SSDEEP

      384:AIdmF+TH95xJMu/0PlxjV8BINhuLJ37tMOpuqqz3KK7eIVmiM1QdaKxqEpLR:AIsF8HdbKjV8BX7Vy6K7eIVTAQdSE

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks