General

  • Target

    d28a18686cb20f31282535f7ea78bd2a_JaffaCakes118

  • Size

    77KB

  • Sample

    241207-p3wfjsyjcq

  • MD5

    d28a18686cb20f31282535f7ea78bd2a

  • SHA1

    14c6d8cc574c0f1b8dd92207014ad9b7507c9263

  • SHA256

    ccf0cba64a0e15567a13c7178f305910c0f7d9cbf9da3152e1241d5bc8e4606e

  • SHA512

    906591d2dcea2fd5619d36385ed44c28abc63358cb5f76eff8d0e566498297af23c260b96c92527f8016e583723835b7de676449c495192b4a3bacd39cc5b41b

  • SSDEEP

    1536:mB1WMQ/WTn1kuaE3Bf4n76dBklpIDb2DI/XHHHelevHHIbPAt28Bb:mn4eTGuaeOn2ncob2SHHhHoTAg85

Malware Config

Extracted

Family

xtremerat

C2

eminem30.no-ip.org

Targets

    • Target

      d28a18686cb20f31282535f7ea78bd2a_JaffaCakes118

    • Size

      77KB

    • MD5

      d28a18686cb20f31282535f7ea78bd2a

    • SHA1

      14c6d8cc574c0f1b8dd92207014ad9b7507c9263

    • SHA256

      ccf0cba64a0e15567a13c7178f305910c0f7d9cbf9da3152e1241d5bc8e4606e

    • SHA512

      906591d2dcea2fd5619d36385ed44c28abc63358cb5f76eff8d0e566498297af23c260b96c92527f8016e583723835b7de676449c495192b4a3bacd39cc5b41b

    • SSDEEP

      1536:mB1WMQ/WTn1kuaE3Bf4n76dBklpIDb2DI/XHHHelevHHIbPAt28Bb:mn4eTGuaeOn2ncob2SHHhHoTAg85

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks