General

  • Target

    6564b415bff66338744ef9517cfd09b4_JaffaCakes118

  • Size

    276KB

  • Sample

    241021-d88ghsycpq

  • MD5

    6564b415bff66338744ef9517cfd09b4

  • SHA1

    6f7c46394554f59472b66bf10a33a3980f1cff10

  • SHA256

    e819a33b00f96112fea753a9289c1973238bdabd80bb5bfa29d047d39447b1eb

  • SHA512

    6d1c9b3cfa75b2a2fc772343723915ff98d6cd4483576d3ef33bef6b647540e97d4bc7d59af9b85cf9946a1a29c62b2cb51f56f651dec7426f76f8ca6aa0ffa6

  • SSDEEP

    6144:jgSHG8wBvVh8I2BLyZgJHR/mLYFxtUrhfr/HyAUDUZwg8uKn6psx:UeChfn218kHIMFPUrRr/dYUfCz

Malware Config

Extracted

Family

xtremerat

C2

blackdevil2011.no-ip.biz

Targets

    • Target

      6564b415bff66338744ef9517cfd09b4_JaffaCakes118

    • Size

      276KB

    • MD5

      6564b415bff66338744ef9517cfd09b4

    • SHA1

      6f7c46394554f59472b66bf10a33a3980f1cff10

    • SHA256

      e819a33b00f96112fea753a9289c1973238bdabd80bb5bfa29d047d39447b1eb

    • SHA512

      6d1c9b3cfa75b2a2fc772343723915ff98d6cd4483576d3ef33bef6b647540e97d4bc7d59af9b85cf9946a1a29c62b2cb51f56f651dec7426f76f8ca6aa0ffa6

    • SSDEEP

      6144:jgSHG8wBvVh8I2BLyZgJHR/mLYFxtUrhfr/HyAUDUZwg8uKn6psx:UeChfn218kHIMFPUrRr/dYUfCz

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks