General

  • Target

    fb74403d4776e8cb1bfa21dbd6fd98dc_JaffaCakes118

  • Size

    224KB

  • Sample

    241218-n6npfayqgj

  • MD5

    fb74403d4776e8cb1bfa21dbd6fd98dc

  • SHA1

    6bad2e8d247dfc844c61c9b40b097e8e8a04a9d8

  • SHA256

    426a6541af612796bb2b4d4a5f6f4aed4648cc1efe419bf0861672c170e3d581

  • SHA512

    9c677bac6165f9e69e5bdcd0d54dbe00e3cc2399ebe295c42559072558591d92d03cb249d9bf5b3af2d6fda6009096d62af1de9c9e1750b2c4587cd90ebf9395

  • SSDEEP

    3072:EoO97BH+vJfCOOYjaFi/WimUrPdy4z0gJPKVDfzxH2LFZRL:ErleFCuaFGYDbp8vL

Malware Config

Extracted

Family

xtremerat

C2

rappelz2.zapto.org

getdesktoppreviewinfo|224rappelz2.zapto.org

Targets

    • Target

      fb74403d4776e8cb1bfa21dbd6fd98dc_JaffaCakes118

    • Size

      224KB

    • MD5

      fb74403d4776e8cb1bfa21dbd6fd98dc

    • SHA1

      6bad2e8d247dfc844c61c9b40b097e8e8a04a9d8

    • SHA256

      426a6541af612796bb2b4d4a5f6f4aed4648cc1efe419bf0861672c170e3d581

    • SHA512

      9c677bac6165f9e69e5bdcd0d54dbe00e3cc2399ebe295c42559072558591d92d03cb249d9bf5b3af2d6fda6009096d62af1de9c9e1750b2c4587cd90ebf9395

    • SSDEEP

      3072:EoO97BH+vJfCOOYjaFi/WimUrPdy4z0gJPKVDfzxH2LFZRL:ErleFCuaFGYDbp8vL

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks