General

  • Target

    JaffaCakes118_8c8b32e34654515fdb07baeb6548e8cd

  • Size

    815KB

  • Sample

    250117-qcvxrszkck

  • MD5

    8c8b32e34654515fdb07baeb6548e8cd

  • SHA1

    66d67489d3b2b70f2e36706b32b053688343c939

  • SHA256

    23b7be94ac173398c3626382f7b475ad13fc299afe3788e6812502b23592cb0b

  • SHA512

    77b6d7d524f56e75a3a3ee5001fc2e027cfcd945db6724a9750ab3a3646ba5b1cbde72fa88b7ce71a40c5d8c5af4344fe0cfe0a1891dffceea32f8a707729d7c

  • SSDEEP

    12288:fo2iE8n9yXz4LSiecUoSkBBjjPOMccUXas2HFJHIg4uDz:gb9yhrgHPFccAH2HFJHIgJz

Malware Config

Extracted

Family

xtremerat

C2

nerozhack.ddns.com.br

alonedevil.no-ip.org

gameszero.dyndns.org

Targets

    • Target

      JaffaCakes118_8c8b32e34654515fdb07baeb6548e8cd

    • Size

      815KB

    • MD5

      8c8b32e34654515fdb07baeb6548e8cd

    • SHA1

      66d67489d3b2b70f2e36706b32b053688343c939

    • SHA256

      23b7be94ac173398c3626382f7b475ad13fc299afe3788e6812502b23592cb0b

    • SHA512

      77b6d7d524f56e75a3a3ee5001fc2e027cfcd945db6724a9750ab3a3646ba5b1cbde72fa88b7ce71a40c5d8c5af4344fe0cfe0a1891dffceea32f8a707729d7c

    • SSDEEP

      12288:fo2iE8n9yXz4LSiecUoSkBBjjPOMccUXas2HFJHIg4uDz:gb9yhrgHPFccAH2HFJHIgJz

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Drops file in Drivers directory

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks