General

  • Target

    9400d1ebcbf44687c8a5347e0f8a382f_JaffaCakes118

  • Size

    110KB

  • Sample

    241124-l8j3xsvmd1

  • MD5

    9400d1ebcbf44687c8a5347e0f8a382f

  • SHA1

    582b4fd345df8bd0cdc2b83c5fa71ed3854ef07a

  • SHA256

    2030b7f91cbb02b5ee21bc563673593f8880f84a0b4e04296e95d4fdca2b777c

  • SHA512

    d2a383932d18ebab604d511fc12c76989370b94f536020b84e4f91ab5eb6b6cd969d98fc96f58c059aeb9143b28045542abc62b9b685364fe9bd52b74038c054

  • SSDEEP

    3072:8dvVjqqdqqqLJqMPaZ0JKYws5hPSMNWrw7JfPZF7e+U9Fn:8dvVjqqdqqqLJqkdh/YrorK+U

Malware Config

Extracted

Family

xtremerat

C2

mimmo86.no-ip.org

Targets

    • Target

      9400d1ebcbf44687c8a5347e0f8a382f_JaffaCakes118

    • Size

      110KB

    • MD5

      9400d1ebcbf44687c8a5347e0f8a382f

    • SHA1

      582b4fd345df8bd0cdc2b83c5fa71ed3854ef07a

    • SHA256

      2030b7f91cbb02b5ee21bc563673593f8880f84a0b4e04296e95d4fdca2b777c

    • SHA512

      d2a383932d18ebab604d511fc12c76989370b94f536020b84e4f91ab5eb6b6cd969d98fc96f58c059aeb9143b28045542abc62b9b685364fe9bd52b74038c054

    • SSDEEP

      3072:8dvVjqqdqqqLJqMPaZ0JKYws5hPSMNWrw7JfPZF7e+U9Fn:8dvVjqqdqqqLJqkdh/YrorK+U

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks