General

  • Target

    bf2941f996c868b20d35e42cc3096783_JaffaCakes118

  • Size

    21KB

  • Sample

    241203-zkv26stkez

  • MD5

    bf2941f996c868b20d35e42cc3096783

  • SHA1

    2db5421ab5d2402d7ba5b3e7088e3b96acc63f62

  • SHA256

    945a79cf1fdd8a72d24339c6d0e6b5d2543ba83bc5a9e70641774ae6813aa176

  • SHA512

    218d2a0ceaa8acdde8d200e424a6d96334a3514b4c06c92390eab7233392b6e4b2949dcc21ba87d5b53bd9b8e2c3333767826158a24814bafe53a7d2384a6aa8

  • SSDEEP

    384:rtIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlTpQ4KbIAbziQqepLR:xIsF81fG9QveLOYTe5Yi1pQl4Qb

Malware Config

Extracted

Family

xtremerat

C2

ahmed501.no-ip.biz

Targets

    • Target

      bf2941f996c868b20d35e42cc3096783_JaffaCakes118

    • Size

      21KB

    • MD5

      bf2941f996c868b20d35e42cc3096783

    • SHA1

      2db5421ab5d2402d7ba5b3e7088e3b96acc63f62

    • SHA256

      945a79cf1fdd8a72d24339c6d0e6b5d2543ba83bc5a9e70641774ae6813aa176

    • SHA512

      218d2a0ceaa8acdde8d200e424a6d96334a3514b4c06c92390eab7233392b6e4b2949dcc21ba87d5b53bd9b8e2c3333767826158a24814bafe53a7d2384a6aa8

    • SSDEEP

      384:rtIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlTpQ4KbIAbziQqepLR:xIsF81fG9QveLOYTe5Yi1pQl4Qb

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks