General

  • Target

    JaffaCakes118_797d201e46cde4c679af90731b2ee6ba

  • Size

    399KB

  • Sample

    250104-nsgzqsznap

  • MD5

    797d201e46cde4c679af90731b2ee6ba

  • SHA1

    5a09d9769f96efc15dc1bf469201fc9e155dbd9f

  • SHA256

    27ae9640d6bbb53b4c6cfdc6bb6e78509d0a3304fdbcdd93f74cfa24c8dd52ff

  • SHA512

    ff75935ea20258c7a7d227c97f6cb15ab8e9187d622e1911701528b6ba3c905a98c121eb34efc4fdf236eca515a10c44e93798c3aa06a56bf7b19807ead4aa03

  • SSDEEP

    3072:lDuLbG2l1EelksP4jm1aNKmaCEDvq+pFyNRYhxXK:lDuLr1EelksA61aN2COigeRP

Malware Config

Extracted

Family

xtremerat

C2

hackedd.no-ip.org

Targets

    • Target

      JaffaCakes118_797d201e46cde4c679af90731b2ee6ba

    • Size

      399KB

    • MD5

      797d201e46cde4c679af90731b2ee6ba

    • SHA1

      5a09d9769f96efc15dc1bf469201fc9e155dbd9f

    • SHA256

      27ae9640d6bbb53b4c6cfdc6bb6e78509d0a3304fdbcdd93f74cfa24c8dd52ff

    • SHA512

      ff75935ea20258c7a7d227c97f6cb15ab8e9187d622e1911701528b6ba3c905a98c121eb34efc4fdf236eca515a10c44e93798c3aa06a56bf7b19807ead4aa03

    • SSDEEP

      3072:lDuLbG2l1EelksP4jm1aNKmaCEDvq+pFyNRYhxXK:lDuLr1EelksA61aN2COigeRP

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks