General

  • Target

    6957193727c47e3125d25ad04b763bcc_JaffaCakes118

  • Size

    144KB

  • Sample

    241022-hex6xascmg

  • MD5

    6957193727c47e3125d25ad04b763bcc

  • SHA1

    eac28b8fb99bda5cead28b52112671a222dec213

  • SHA256

    fca938a9249dd5b49bd71e003a77928436fa9a8329d3e40bf64dfb0eb2828ae9

  • SHA512

    4b5044bb4f92aa92a1e954922f7aa3b2ab2e53e59f8d5c05e0ff9942e92d89aa608ff16b2fc53cab8e10488113ef0b8e1b9bc591c78c135af1814ed7dc975f5d

  • SSDEEP

    1536:glQbC086HfA6wKBZbryh0Vttv+uuvBIIZ7KwEGMGVtc906jZh:gybCUI4tgvnxxEmH6jv

Malware Config

Extracted

Family

xtremerat

C2

ayada.no-ip.info

Targets

    • Target

      6957193727c47e3125d25ad04b763bcc_JaffaCakes118

    • Size

      144KB

    • MD5

      6957193727c47e3125d25ad04b763bcc

    • SHA1

      eac28b8fb99bda5cead28b52112671a222dec213

    • SHA256

      fca938a9249dd5b49bd71e003a77928436fa9a8329d3e40bf64dfb0eb2828ae9

    • SHA512

      4b5044bb4f92aa92a1e954922f7aa3b2ab2e53e59f8d5c05e0ff9942e92d89aa608ff16b2fc53cab8e10488113ef0b8e1b9bc591c78c135af1814ed7dc975f5d

    • SSDEEP

      1536:glQbC086HfA6wKBZbryh0Vttv+uuvBIIZ7KwEGMGVtc906jZh:gybCUI4tgvnxxEmH6jv

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks