Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    JaffaCakes118_30247f22c107feb1c35f4471ba4cfecd

  • Size

    277KB

  • Sample

    250125-2aba5atpek

  • MD5

    30247f22c107feb1c35f4471ba4cfecd

  • SHA1

    0235258bf258c3f48a96cb1154573d16fa5bdaeb

  • SHA256

    5b8f260d43a454fa6a9c16f4146cbd5bcd1c935318a6020a0bb2916f6d71eb25

  • SHA512

    7d465dee99cade329ae41cd903e6279dbb755cf527b88da381b644234fbe7a869dfd3e73a561053f6de5f4fa74f20679fa592f978020ef62dbdec4d353c98ec6

  • SSDEEP

    6144:OGxnbpdjjaur3jR2Z4zytbLfGPRD3Indz:1tdKuni4zkUbidz

Malware Config

Extracted

Family

xtremerat

C2

bondehacker.no-ip.org

Targets

    • Target

      JaffaCakes118_30247f22c107feb1c35f4471ba4cfecd

    • Size

      277KB

    • MD5

      30247f22c107feb1c35f4471ba4cfecd

    • SHA1

      0235258bf258c3f48a96cb1154573d16fa5bdaeb

    • SHA256

      5b8f260d43a454fa6a9c16f4146cbd5bcd1c935318a6020a0bb2916f6d71eb25

    • SHA512

      7d465dee99cade329ae41cd903e6279dbb755cf527b88da381b644234fbe7a869dfd3e73a561053f6de5f4fa74f20679fa592f978020ef62dbdec4d353c98ec6

    • SSDEEP

      6144:OGxnbpdjjaur3jR2Z4zytbLfGPRD3Indz:1tdKuni4zkUbidz

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks