General

  • Target

    b939bbcdeb5a498e6be4528bb08bcd32_JaffaCakes118

  • Size

    21KB

  • Sample

    241202-vc4bcssqbv

  • MD5

    b939bbcdeb5a498e6be4528bb08bcd32

  • SHA1

    db7f66363caab73fe921b526671008a700bb9610

  • SHA256

    b2684e98ff0d7550322e4bcdbed43bbd58553b47ed18e45f23c25c10f0c711d5

  • SHA512

    541e247824b9363fe1d676572057f874835d66f401acbd2aee4e7350fe98c74130ca37d0b35e715ee878cb3dd2c6936f0cec336e7e5a88bb174e3928cae25392

  • SSDEEP

    384:pIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlOUdwe5FKj5EMn0pLR:pIsF81fG9QveLOYTe5YioUdB6U

Malware Config

Extracted

Family

xtremerat

C2

hacker3oof.no-ip.biz

Targets

    • Target

      b939bbcdeb5a498e6be4528bb08bcd32_JaffaCakes118

    • Size

      21KB

    • MD5

      b939bbcdeb5a498e6be4528bb08bcd32

    • SHA1

      db7f66363caab73fe921b526671008a700bb9610

    • SHA256

      b2684e98ff0d7550322e4bcdbed43bbd58553b47ed18e45f23c25c10f0c711d5

    • SHA512

      541e247824b9363fe1d676572057f874835d66f401acbd2aee4e7350fe98c74130ca37d0b35e715ee878cb3dd2c6936f0cec336e7e5a88bb174e3928cae25392

    • SSDEEP

      384:pIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlOUdwe5FKj5EMn0pLR:pIsF81fG9QveLOYTe5YioUdB6U

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks