General

  • Target

    f18b9e3bb58a0262e9620e8aa1d78f18_JaffaCakes118

  • Size

    206KB

  • Sample

    241215-ba58ds1mcm

  • MD5

    f18b9e3bb58a0262e9620e8aa1d78f18

  • SHA1

    4d9606a8cf0d40d56306453d481029acba358517

  • SHA256

    758210b041abec8256d65dbf7e223222bcff6f848299425ead942ae4d0eb7e20

  • SHA512

    c74315c3b155911530fa2ee1433bf393617d087c19ecbb398978fd38462e5830cd1b244e2f4606721ffb454d9693300900f36c43a158a5a1932d68a9a3d51656

  • SSDEEP

    3072:Ndz60Ru+9vLZCnbPeGG1u4nDvhoZK4LpepIjpB:Ng0/tV0bPeGenjhM7jb

Malware Config

Extracted

Family

xtremerat

C2

gamelistview.no-ip.org

Targets

    • Target

      f18b9e3bb58a0262e9620e8aa1d78f18_JaffaCakes118

    • Size

      206KB

    • MD5

      f18b9e3bb58a0262e9620e8aa1d78f18

    • SHA1

      4d9606a8cf0d40d56306453d481029acba358517

    • SHA256

      758210b041abec8256d65dbf7e223222bcff6f848299425ead942ae4d0eb7e20

    • SHA512

      c74315c3b155911530fa2ee1433bf393617d087c19ecbb398978fd38462e5830cd1b244e2f4606721ffb454d9693300900f36c43a158a5a1932d68a9a3d51656

    • SSDEEP

      3072:Ndz60Ru+9vLZCnbPeGG1u4nDvhoZK4LpepIjpB:Ng0/tV0bPeGenjhM7jb

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks