General

  • Target

    a2ed1f80ee06b027fc944d6c2f6b163c_JaffaCakes118

  • Size

    608KB

  • Sample

    241126-tr2kmsvngm

  • MD5

    a2ed1f80ee06b027fc944d6c2f6b163c

  • SHA1

    09e0348cf0db690ebb09afc0c34cf1c367cb3c84

  • SHA256

    8019903919c7330a0b4d30dc339280a58736cd748ad8a045213e6f905893a7d1

  • SHA512

    8be7ab788b4125b2139215f09be9239a4e410d8eea78917a7ac0907b1a90aa872627b88f8e2a0a6a6ed9291e3f9439064784baeb5e46b86308118a227201cdab

  • SSDEEP

    3072:zPSntbmP+T1st246/YXyKqNaKniNMPKF9dE9kprz4c03rg6qF+c7Et7fa3/1vff:zPSXc1X

Malware Config

Extracted

Family

xtremerat

C2

laptope.sytes.net

Targets

    • Target

      a2ed1f80ee06b027fc944d6c2f6b163c_JaffaCakes118

    • Size

      608KB

    • MD5

      a2ed1f80ee06b027fc944d6c2f6b163c

    • SHA1

      09e0348cf0db690ebb09afc0c34cf1c367cb3c84

    • SHA256

      8019903919c7330a0b4d30dc339280a58736cd748ad8a045213e6f905893a7d1

    • SHA512

      8be7ab788b4125b2139215f09be9239a4e410d8eea78917a7ac0907b1a90aa872627b88f8e2a0a6a6ed9291e3f9439064784baeb5e46b86308118a227201cdab

    • SSDEEP

      3072:zPSntbmP+T1st246/YXyKqNaKniNMPKF9dE9kprz4c03rg6qF+c7Et7fa3/1vff:zPSXc1X

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks