General

  • Target

    JaffaCakes118_63cfe5bb2399a9a09bceb05cd93761e0

  • Size

    95KB

  • Sample

    250102-kdmd5atkgz

  • MD5

    63cfe5bb2399a9a09bceb05cd93761e0

  • SHA1

    c1bbf1cc74d026f92e3bf4d77fb2432a67434620

  • SHA256

    b1a063a92528c192400d9a031b295acca8f5773a10c7663655d4e779c30b2659

  • SHA512

    1e4fa9a575372a200403dfd47c161da491232c02a0b3550343542b392314dff94befdfb58e250972af92c5e89fe3e2f612bbbb536c78b3bde66b165ffa394400

  • SSDEEP

    1536:i9PB8bUVQ3WZX9xwcwLSbM9VvfHzhe3xnmSfAQTUZdoO3ZjE:i9PB8bU2Csc+2M9BLhe3ZAQwLoO3Zj

Malware Config

Extracted

Family

xtremerat

C2

stanko.no-ip.biz

Targets

    • Target

      JaffaCakes118_63cfe5bb2399a9a09bceb05cd93761e0

    • Size

      95KB

    • MD5

      63cfe5bb2399a9a09bceb05cd93761e0

    • SHA1

      c1bbf1cc74d026f92e3bf4d77fb2432a67434620

    • SHA256

      b1a063a92528c192400d9a031b295acca8f5773a10c7663655d4e779c30b2659

    • SHA512

      1e4fa9a575372a200403dfd47c161da491232c02a0b3550343542b392314dff94befdfb58e250972af92c5e89fe3e2f612bbbb536c78b3bde66b165ffa394400

    • SSDEEP

      1536:i9PB8bUVQ3WZX9xwcwLSbM9VvfHzhe3xnmSfAQTUZdoO3ZjE:i9PB8bU2Csc+2M9BLhe3ZAQwLoO3Zj

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks