General

  • Target

    JaffaCakes118_6f106dff609527125737c4d308b485a0

  • Size

    55KB

  • Sample

    250103-yc4hxazmd1

  • MD5

    6f106dff609527125737c4d308b485a0

  • SHA1

    c7cc440976dc976809d8efae5fc172c8cf9cf70f

  • SHA256

    6072536e1c68913f2effcacbb4b4b0f32ca7c3bbc1a65fc700c3db86975f631f

  • SHA512

    765dc690b33834d9feda57c9ad43b6691e42517b4319656987fbb34a518e780804f4690ab1b022226dfd2f4650c8c8f57ea33ae41fcb4e03cf6423dcf01935a2

  • SSDEEP

    1536:IddG2U6KUL/dcYgRUgDIZb0XgnJiFRyYqlDP:ME2EUjF0w4FR7ODP

Malware Config

Extracted

Family

xtremerat

C2

kasmsss.no-ip.biz

Targets

    • Target

      sample

    • Size

      39KB

    • MD5

      f49720377b99b63148ea58af59500e1c

    • SHA1

      8c6c28eebfb561ee42b86b87c38c63db08306670

    • SHA256

      1b5d7a30ee1b398082624912e0f27c6a5c7eb52f5cd5f7f2f6b1308b58313be4

    • SHA512

      7ff9d1dc33ae0d58db7a7b0ec790af6aac5aeca4b950cf11070c88bb190da229b5f073af7de38a2be425b23e9146f3a7323d4b5daf39d1f12bcc12c8620bf12b

    • SSDEEP

      768:BMuijtHf5g7/IIG3bGcYDBSvFIWuePQtv66lYQtzug2GnpFgG:qNW71rcYDAWeotvXlY2KInpB

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks