General

  • Target

    b210a623a413d1d70e591d77a8898cc5_JaffaCakes118

  • Size

    60KB

  • Sample

    241129-sk93rswqen

  • MD5

    b210a623a413d1d70e591d77a8898cc5

  • SHA1

    0b8fae8206d05c59242dd84bf6dd168eaa2de2b1

  • SHA256

    a4df1f57b5681a11704b581976bae2e2baf69a050ef1d71dae2ea2304ff907e1

  • SHA512

    c4bd1ce33ff611ba1d5c2ef421fc0bcc4bb2b3f54dbc1b9ee0b4a6215cbe40e04a565389d22bae3018cab8464f10a3639c861dac3208227a20aa1a75323c7367

  • SSDEEP

    1536:g5QAEeWPJ37BVtP3siRXArf7VdyfhkZhJlByx1m4zf7ewHLzDKzFk9yFF:gKAEeUJLBVtP3jXqJdyfhoPlGM+f7ewk

Malware Config

Extracted

Family

xtremerat

C2

esam2at.no-ip.biz

Targets

    • Target

      b210a623a413d1d70e591d77a8898cc5_JaffaCakes118

    • Size

      60KB

    • MD5

      b210a623a413d1d70e591d77a8898cc5

    • SHA1

      0b8fae8206d05c59242dd84bf6dd168eaa2de2b1

    • SHA256

      a4df1f57b5681a11704b581976bae2e2baf69a050ef1d71dae2ea2304ff907e1

    • SHA512

      c4bd1ce33ff611ba1d5c2ef421fc0bcc4bb2b3f54dbc1b9ee0b4a6215cbe40e04a565389d22bae3018cab8464f10a3639c861dac3208227a20aa1a75323c7367

    • SSDEEP

      1536:g5QAEeWPJ37BVtP3siRXArf7VdyfhkZhJlByx1m4zf7ewHLzDKzFk9yFF:gKAEeUJLBVtP3jXqJdyfhoPlGM+f7ewk

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks