General

  • Target

    eebfa09c116e21d5d74c3828c4450f94_JaffaCakes118

  • Size

    158KB

  • Sample

    241214-pk7e4atkhl

  • MD5

    eebfa09c116e21d5d74c3828c4450f94

  • SHA1

    5aece7b3fa05059798e512f5b632e77af237d54b

  • SHA256

    c8d0d7d13a57e0f8a2bbe0edd5f18260154e0b69d82d5c92ff2cbba41cf369ac

  • SHA512

    601a4607f8de8aefa61754f75ae77e59b00f0d7281f651cbc725a64554dd0fdf4df8d449f4f0c1383658b43db1e15cda78e00d0e4baffc4093ad1375da77d32a

  • SSDEEP

    3072:b1dlKwgj23+Oz05YoNozjXXLEsvDABOJUJsObFp6gEI:b1dlZro5yjXNNJUJL5QgEI

Malware Config

Extracted

Family

xtremerat

C2

0profx.no-ip.info

Targets

    • Target

      eebfa09c116e21d5d74c3828c4450f94_JaffaCakes118

    • Size

      158KB

    • MD5

      eebfa09c116e21d5d74c3828c4450f94

    • SHA1

      5aece7b3fa05059798e512f5b632e77af237d54b

    • SHA256

      c8d0d7d13a57e0f8a2bbe0edd5f18260154e0b69d82d5c92ff2cbba41cf369ac

    • SHA512

      601a4607f8de8aefa61754f75ae77e59b00f0d7281f651cbc725a64554dd0fdf4df8d449f4f0c1383658b43db1e15cda78e00d0e4baffc4093ad1375da77d32a

    • SSDEEP

      3072:b1dlKwgj23+Oz05YoNozjXXLEsvDABOJUJsObFp6gEI:b1dlZro5yjXNNJUJL5QgEI

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks