General

  • Target

    952f28b649527ca1ff1e50f00bc47bd9_JaffaCakes118

  • Size

    53KB

  • Sample

    241124-rh7dessrcy

  • MD5

    952f28b649527ca1ff1e50f00bc47bd9

  • SHA1

    652ab4f2af79013af87ed383c3cedf737fecedcb

  • SHA256

    2947d3afcf50070a9333ba34c133c8e77e7dd1e8a1dc3c2bfc412f1e099b5fb5

  • SHA512

    1963b171f878dc3222433ed8bb4b449526c8703135a293ac18514fd9a5596be76effd20d883cd70a574cb9c38fe254605dbcc50fed2e489925f99eaf620323a7

  • SSDEEP

    768:cLAPohZs0199cG/TjfTZcjXDVkAet9fSL+jAsD2Ga+vW2AWICavQJn:rozr199cIvf6TDVpnLAAqXxO2A/4

Malware Config

Extracted

Family

xtremerat

C2

zpank593.dyndns.org

Targets

    • Target

      952f28b649527ca1ff1e50f00bc47bd9_JaffaCakes118

    • Size

      53KB

    • MD5

      952f28b649527ca1ff1e50f00bc47bd9

    • SHA1

      652ab4f2af79013af87ed383c3cedf737fecedcb

    • SHA256

      2947d3afcf50070a9333ba34c133c8e77e7dd1e8a1dc3c2bfc412f1e099b5fb5

    • SHA512

      1963b171f878dc3222433ed8bb4b449526c8703135a293ac18514fd9a5596be76effd20d883cd70a574cb9c38fe254605dbcc50fed2e489925f99eaf620323a7

    • SSDEEP

      768:cLAPohZs0199cG/TjfTZcjXDVkAet9fSL+jAsD2Ga+vW2AWICavQJn:rozr199cIvf6TDVpnLAAqXxO2A/4

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks