General

  • Target

    JaffaCakes118_423c6130a471c600f8d376528702fd15

  • Size

    124KB

  • Sample

    250114-wqy48sxkgl

  • MD5

    423c6130a471c600f8d376528702fd15

  • SHA1

    022e4a467677920b4cc46bcbfaceb35bccf6274c

  • SHA256

    2999f314a6bed51858277069fbaf9ca01d506871d7e7bd4798e76ebc977b4762

  • SHA512

    36608ce1a457c8a358c0752d0975ca7d5e8b44eda87851d6032bd6eeba4bc11cd9d83f77037080a3d7ac98a8f40a63f1dbdea11ae5327fd745f71d7ea3d13210

  • SSDEEP

    3072:/7qXvBlJ9ks1I3cieVDlrJA0iqqyXI5hgsODDjKP:zEvLJys1XieVDBfXEh18S

Malware Config

Extracted

Family

xtremerat

C2

dannymatrix.no-ip.org

Targets

    • Target

      JaffaCakes118_423c6130a471c600f8d376528702fd15

    • Size

      124KB

    • MD5

      423c6130a471c600f8d376528702fd15

    • SHA1

      022e4a467677920b4cc46bcbfaceb35bccf6274c

    • SHA256

      2999f314a6bed51858277069fbaf9ca01d506871d7e7bd4798e76ebc977b4762

    • SHA512

      36608ce1a457c8a358c0752d0975ca7d5e8b44eda87851d6032bd6eeba4bc11cd9d83f77037080a3d7ac98a8f40a63f1dbdea11ae5327fd745f71d7ea3d13210

    • SSDEEP

      3072:/7qXvBlJ9ks1I3cieVDlrJA0iqqyXI5hgsODDjKP:zEvLJys1XieVDBfXEh18S

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks