General

  • Target

    JaffaCakes118_eb408548550716af12afc78f556e1dbf

  • Size

    292KB

  • Sample

    250120-rq2sxatman

  • MD5

    eb408548550716af12afc78f556e1dbf

  • SHA1

    7ec7db3e4ccea872f64bddefb4b3842ec4044f41

  • SHA256

    15fdcd69328ac570a926c6a2b9ea43698fa7bbcd63742c2cc622b9e7154a1f9d

  • SHA512

    6996490ce44b826a0acaeee1b695a89d592e4a6282569a14752c6e4177ee530fd79a65de5d66a36227bb86e0f6e1b3fe9f80c072e9e61fc49d277378388f45a0

  • SSDEEP

    6144:4C737IzQsHXlPaKrvGdAQqGU+ZD7XGxAqDUwXwum:1rIU4XlixpqGU+ZD7cAqDnY

Malware Config

Extracted

Family

xtremerat

C2

alshe5.no-ip.org

Targets

    • Target

      JaffaCakes118_eb408548550716af12afc78f556e1dbf

    • Size

      292KB

    • MD5

      eb408548550716af12afc78f556e1dbf

    • SHA1

      7ec7db3e4ccea872f64bddefb4b3842ec4044f41

    • SHA256

      15fdcd69328ac570a926c6a2b9ea43698fa7bbcd63742c2cc622b9e7154a1f9d

    • SHA512

      6996490ce44b826a0acaeee1b695a89d592e4a6282569a14752c6e4177ee530fd79a65de5d66a36227bb86e0f6e1b3fe9f80c072e9e61fc49d277378388f45a0

    • SSDEEP

      6144:4C737IzQsHXlPaKrvGdAQqGU+ZD7XGxAqDUwXwum:1rIU4XlixpqGU+ZD7cAqDnY

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks