General

  • Target

    JaffaCakes118_d2f4f2ce9f0b24f4e95f17d05400b58f

  • Size

    261KB

  • Sample

    250119-zqdp3svrcv

  • MD5

    d2f4f2ce9f0b24f4e95f17d05400b58f

  • SHA1

    75a53216ae4e9119bad516a19f5a96e455fce6d2

  • SHA256

    12187a203bed0b7050eab25f2a053dc26f8bd9eae2ecc8fa3a2caab7a379ac50

  • SHA512

    d919b434278a002b5714789589d8ba593a3ed1f75d5d72b0467938c7a25af741f28a2356cd6021530ef0fc85373980c03a279eb26502d580746eb5b3620e29ea

  • SSDEEP

    6144:/MqPhsvTkou98LwvP6bQ7yMP+DE827fVdoj:/MqP8Tw6b7MP+Dd27VKj

Malware Config

Extracted

Family

xtremerat

C2

trojandeneme001.zapto.org

Targets

    • Target

      JaffaCakes118_d2f4f2ce9f0b24f4e95f17d05400b58f

    • Size

      261KB

    • MD5

      d2f4f2ce9f0b24f4e95f17d05400b58f

    • SHA1

      75a53216ae4e9119bad516a19f5a96e455fce6d2

    • SHA256

      12187a203bed0b7050eab25f2a053dc26f8bd9eae2ecc8fa3a2caab7a379ac50

    • SHA512

      d919b434278a002b5714789589d8ba593a3ed1f75d5d72b0467938c7a25af741f28a2356cd6021530ef0fc85373980c03a279eb26502d580746eb5b3620e29ea

    • SSDEEP

      6144:/MqPhsvTkou98LwvP6bQ7yMP+DE827fVdoj:/MqP8Tw6b7MP+Dd27VKj

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks