General

  • Target

    8d47f815c276735b6a1d555a3e568884_JaffaCakes118

  • Size

    113KB

  • Sample

    241103-yxtt7stepm

  • MD5

    8d47f815c276735b6a1d555a3e568884

  • SHA1

    c0d2ef0ba575fa6825545ef4cbb7b11b7d5de84b

  • SHA256

    3e516424ae7a476715627a7ca297ff0c904c5d855b05ffef04ad427298f1ab13

  • SHA512

    e36bf2e557ef5d56bd0a1d44cd4bcdac89d3ba19daa8210c55231051227f25c3d886f54ef9068eaf150b42b4d2007392734341d9a3a0c3189bf40e6847318096

  • SSDEEP

    1536:VdOqztWa1qOfjePIjziyo85gPwpPMyNqmVuR9ZKxNYoo9FVJx5xIVZ97:VMqpFXiy9AR4uxKxpo9vwT97

Malware Config

Extracted

Family

xtremerat

C2

franco800.no-ip.org

Targets

    • Target

      8d47f815c276735b6a1d555a3e568884_JaffaCakes118

    • Size

      113KB

    • MD5

      8d47f815c276735b6a1d555a3e568884

    • SHA1

      c0d2ef0ba575fa6825545ef4cbb7b11b7d5de84b

    • SHA256

      3e516424ae7a476715627a7ca297ff0c904c5d855b05ffef04ad427298f1ab13

    • SHA512

      e36bf2e557ef5d56bd0a1d44cd4bcdac89d3ba19daa8210c55231051227f25c3d886f54ef9068eaf150b42b4d2007392734341d9a3a0c3189bf40e6847318096

    • SSDEEP

      1536:VdOqztWa1qOfjePIjziyo85gPwpPMyNqmVuR9ZKxNYoo9FVJx5xIVZ97:VMqpFXiy9AR4uxKxpo9vwT97

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks