General

  • Target

    JaffaCakes118_0674ee30d2a20f925e451f383b19083b

  • Size

    212KB

  • Sample

    250121-wmamgawjhx

  • MD5

    0674ee30d2a20f925e451f383b19083b

  • SHA1

    acbe9227ae5582a1b5b9ff41d9bdc20cbd2b8255

  • SHA256

    a1201f2a189e58d9fa7cb6a62ac86ec0fef9635c700bd7dd30c6175bb27ce9aa

  • SHA512

    f059bc7e3147d3b6b0e9a746290f53394dc18f433b238792102ca5fe5906e25281320b664fa3095fef0950d4ca32a9c87a3df060446cabf276ef74c662bebf2b

  • SSDEEP

    3072:frBknjHg3/WoXpO5qeRcVYxSpIIQbe4nNw6Jvgy1BYXkZ5xroPfsneaGtugcfgN9:fis1kqeqVYxSpInlvgercF6gcfj

Malware Config

Extracted

Family

xtremerat

C2

ihazx.dyndns.biz

Targets

    • Target

      JaffaCakes118_0674ee30d2a20f925e451f383b19083b

    • Size

      212KB

    • MD5

      0674ee30d2a20f925e451f383b19083b

    • SHA1

      acbe9227ae5582a1b5b9ff41d9bdc20cbd2b8255

    • SHA256

      a1201f2a189e58d9fa7cb6a62ac86ec0fef9635c700bd7dd30c6175bb27ce9aa

    • SHA512

      f059bc7e3147d3b6b0e9a746290f53394dc18f433b238792102ca5fe5906e25281320b664fa3095fef0950d4ca32a9c87a3df060446cabf276ef74c662bebf2b

    • SSDEEP

      3072:frBknjHg3/WoXpO5qeRcVYxSpIIQbe4nNw6Jvgy1BYXkZ5xroPfsneaGtugcfgN9:fis1kqeqVYxSpInlvgercF6gcfj

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks