General

  • Target

    f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118

  • Size

    685KB

  • Sample

    241215-gy168swmay

  • MD5

    f2aa74f5d4ac35cd067022246655dfaf

  • SHA1

    5e10b808b17403bb20f64442f74e31aefe882068

  • SHA256

    e32e876c6af71b87d4a8de66c639fa6077dec93b210c1f6f2efffb5794bbc1b8

  • SHA512

    7b9c06e90ba760427cfbb36bf93a35525d110f1b2117c08b0bf8fa73e9e4683afbc5e2327a0efb5227899cbcaeaf4f1e8977d89bf2d5dbe0732cc43b78616148

  • SSDEEP

    12288:mQZuOWo7YNQN2YcKify3iC8ut0i1oQjUZbvFFF/Dr5uiunB+3Ygiv:mn4wQgsiK3AcIXFFf5uiuBJv

Malware Config

Extracted

Family

xtremerat

C2

cuore.no-ip.org

cantante1.no-ip.org

Targets

    • Target

      f2aa74f5d4ac35cd067022246655dfaf_JaffaCakes118

    • Size

      685KB

    • MD5

      f2aa74f5d4ac35cd067022246655dfaf

    • SHA1

      5e10b808b17403bb20f64442f74e31aefe882068

    • SHA256

      e32e876c6af71b87d4a8de66c639fa6077dec93b210c1f6f2efffb5794bbc1b8

    • SHA512

      7b9c06e90ba760427cfbb36bf93a35525d110f1b2117c08b0bf8fa73e9e4683afbc5e2327a0efb5227899cbcaeaf4f1e8977d89bf2d5dbe0732cc43b78616148

    • SSDEEP

      12288:mQZuOWo7YNQN2YcKify3iC8ut0i1oQjUZbvFFF/Dr5uiunB+3Ygiv:mn4wQgsiK3AcIXFFf5uiuBJv

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks