General

  • Target

    e8828ef7328cfa84e5cfccfc399645dd_JaffaCakes118

  • Size

    166KB

  • Sample

    241212-12w68s1lak

  • MD5

    e8828ef7328cfa84e5cfccfc399645dd

  • SHA1

    5be3525a5cf3a5c99be280812788f766c8c45ce5

  • SHA256

    172ed8dccfa77af72fa89cc401f07e06aedf891f5948653dba43a4ef3d2def72

  • SHA512

    71921c64a39d0ec7f6b46dc1fd3e3f94fdcb20f9cfe1da2fa33c81dc2df7da1fd68098f4fdf08faf8d049a24a383d6139b40d4f300ca0a4d913f1ce5e3d07f39

  • SSDEEP

    3072:wkBJK6EP9PhHU/jCrlE8WALcZzgFWTngFuDZAOHINfeXrWGbfmzqwVGTrl2s:wgK6A0zjKGb+z9V27

Malware Config

Extracted

Family

xtremerat

C2

smokepawts.no-ip.info

Targets

    • Target

      e8828ef7328cfa84e5cfccfc399645dd_JaffaCakes118

    • Size

      166KB

    • MD5

      e8828ef7328cfa84e5cfccfc399645dd

    • SHA1

      5be3525a5cf3a5c99be280812788f766c8c45ce5

    • SHA256

      172ed8dccfa77af72fa89cc401f07e06aedf891f5948653dba43a4ef3d2def72

    • SHA512

      71921c64a39d0ec7f6b46dc1fd3e3f94fdcb20f9cfe1da2fa33c81dc2df7da1fd68098f4fdf08faf8d049a24a383d6139b40d4f300ca0a4d913f1ce5e3d07f39

    • SSDEEP

      3072:wkBJK6EP9PhHU/jCrlE8WALcZzgFWTngFuDZAOHINfeXrWGbfmzqwVGTrl2s:wgK6A0zjKGb+z9V27

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks