General

  • Target

    JaffaCakes118_c23af29a7294c4b0349ef3b260aac5bf

  • Size

    113KB

  • Sample

    250119-j43y5a1qhm

  • MD5

    c23af29a7294c4b0349ef3b260aac5bf

  • SHA1

    7d5c8ae5b31b47524b0d8178213b1ee0e0fd8193

  • SHA256

    28f0dde837d3e7b4dd12ac6cd74c757a251c35de98495e0c0018905eeff3f069

  • SHA512

    4524d7b363e1e18c8cf9ff1f4f3ebf0cb9c80e792c867d780bcf8325d1ea0a9a79117af8e596040225d706c93856794ce6364e08cae851a7cecb5faa9f9a6714

  • SSDEEP

    1536:8Nl4rcZPBGpQAiTgxLhLij8+4MNBp1g9DLcgmkkU8rlt8FwD:8YrcvGp5lxLhLlMNfGpzmPrrIFwD

Malware Config

Extracted

Family

xtremerat

C2

\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\Salgeny0.no-ip.biz

Targets

    • Target

      JaffaCakes118_c23af29a7294c4b0349ef3b260aac5bf

    • Size

      113KB

    • MD5

      c23af29a7294c4b0349ef3b260aac5bf

    • SHA1

      7d5c8ae5b31b47524b0d8178213b1ee0e0fd8193

    • SHA256

      28f0dde837d3e7b4dd12ac6cd74c757a251c35de98495e0c0018905eeff3f069

    • SHA512

      4524d7b363e1e18c8cf9ff1f4f3ebf0cb9c80e792c867d780bcf8325d1ea0a9a79117af8e596040225d706c93856794ce6364e08cae851a7cecb5faa9f9a6714

    • SSDEEP

      1536:8Nl4rcZPBGpQAiTgxLhLij8+4MNBp1g9DLcgmkkU8rlt8FwD:8YrcvGp5lxLhLlMNfGpzmPrrIFwD

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks