General

  • Target

    76da88e89cd591bc05ac252fa55da5c9_JaffaCakes118

  • Size

    44KB

  • Sample

    241028-bbm37swgmf

  • MD5

    76da88e89cd591bc05ac252fa55da5c9

  • SHA1

    fc08ca5c26bea96073af84ba35e4c9e4045feadc

  • SHA256

    e3d83dc7b954ee90ed38243d44a4a17538bd50860fd698013fd5b96f6c9af758

  • SHA512

    ec055f4087de864c9645521236ed1ee4e301797b69e181b47a832d2543cf159536f9e751c906ac7825af1d3c1bb301caab76d0b1acb2e26d6c6b38914211745e

  • SSDEEP

    768:MBr+tjFqTPkAlfztB1lr6an3smTA8uvm2DfOTwYPIIpzoW:MyRUHlrL1lr6an3TLuvm2buQYoW

Malware Config

Extracted

Family

xtremerat

C2

mohealdean.no-ip.info

Targets

    • Target

      76da88e89cd591bc05ac252fa55da5c9_JaffaCakes118

    • Size

      44KB

    • MD5

      76da88e89cd591bc05ac252fa55da5c9

    • SHA1

      fc08ca5c26bea96073af84ba35e4c9e4045feadc

    • SHA256

      e3d83dc7b954ee90ed38243d44a4a17538bd50860fd698013fd5b96f6c9af758

    • SHA512

      ec055f4087de864c9645521236ed1ee4e301797b69e181b47a832d2543cf159536f9e751c906ac7825af1d3c1bb301caab76d0b1acb2e26d6c6b38914211745e

    • SSDEEP

      768:MBr+tjFqTPkAlfztB1lr6an3smTA8uvm2DfOTwYPIIpzoW:MyRUHlrL1lr6an3TLuvm2buQYoW

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks