General

  • Target

    92dac7f9ef0fd5ec6fa15c8b532dc86f_JaffaCakes118

  • Size

    54KB

  • Sample

    241124-gf38wawra1

  • MD5

    92dac7f9ef0fd5ec6fa15c8b532dc86f

  • SHA1

    1ca45b3388f0dab33955a4c52b7649487a98998d

  • SHA256

    bcb007991bf11f481e5203d3e71623e5fc03b2986328c400e067d030c8c16b8c

  • SHA512

    42414aa2be543f44afe254015682a425ce1dc02de2683ae8bdb13f279143f7cff151855f15afc7258af60a6885a931fff732d511bee819c73d27e66577579548

  • SSDEEP

    1536:690Z8GgMx+BUvk1XJ05X7bQUZoQ2HA0sj71V:6M/QuIJ05X7MUyQ2HE1V

Malware Config

Extracted

Family

xtremerat

C2

almm.no-ip.biz

Targets

    • Target

      92dac7f9ef0fd5ec6fa15c8b532dc86f_JaffaCakes118

    • Size

      54KB

    • MD5

      92dac7f9ef0fd5ec6fa15c8b532dc86f

    • SHA1

      1ca45b3388f0dab33955a4c52b7649487a98998d

    • SHA256

      bcb007991bf11f481e5203d3e71623e5fc03b2986328c400e067d030c8c16b8c

    • SHA512

      42414aa2be543f44afe254015682a425ce1dc02de2683ae8bdb13f279143f7cff151855f15afc7258af60a6885a931fff732d511bee819c73d27e66577579548

    • SSDEEP

      1536:690Z8GgMx+BUvk1XJ05X7bQUZoQ2HA0sj71V:6M/QuIJ05X7MUyQ2HE1V

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks