General

  • Target

    8490c5867fb61c6c6e8208eb3bcf9b7a_JaffaCakes118

  • Size

    33KB

  • Sample

    241101-xnrstatgkd

  • MD5

    8490c5867fb61c6c6e8208eb3bcf9b7a

  • SHA1

    2d004aa823f605d900b06ea3093d96ca073f74d7

  • SHA256

    90aeebada5d47401cba50db00b9033b43492810da276fa1c8690c2963f7423bb

  • SHA512

    8ed71741747b8c43a2c7461b4bf0f2acdbdf7b8352513956e8566b9b90d6c83ca26b6ae76a3741f0aaf0b3b97bb5b16693c7f18c9055e6ff4cf3de2e02d62215

  • SSDEEP

    768:zMuijtHf5g7/IIG3bGcYDBSvFIWuePQtv66lStzS1t+zVkPWC:INW71rcYDAWeotvXlQVePW

Malware Config

Extracted

Family

xtremerat

C2

slaizer.no-ip.biz

Targets

    • Target

      8490c5867fb61c6c6e8208eb3bcf9b7a_JaffaCakes118

    • Size

      33KB

    • MD5

      8490c5867fb61c6c6e8208eb3bcf9b7a

    • SHA1

      2d004aa823f605d900b06ea3093d96ca073f74d7

    • SHA256

      90aeebada5d47401cba50db00b9033b43492810da276fa1c8690c2963f7423bb

    • SHA512

      8ed71741747b8c43a2c7461b4bf0f2acdbdf7b8352513956e8566b9b90d6c83ca26b6ae76a3741f0aaf0b3b97bb5b16693c7f18c9055e6ff4cf3de2e02d62215

    • SSDEEP

      768:zMuijtHf5g7/IIG3bGcYDBSvFIWuePQtv66lStzS1t+zVkPWC:INW71rcYDAWeotvXlQVePW

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks