General

  • Target

    JaffaCakes118_26f432cc54b00eb694664f120d68dd6f

  • Size

    116KB

  • Sample

    250125-bkbrjayrhr

  • MD5

    26f432cc54b00eb694664f120d68dd6f

  • SHA1

    b077c9c1a4552bdc46796465b94e5bda0ad8280e

  • SHA256

    ba518fc769aadcb2a6ad511a67536050d1148f45739374883bf8138c858c9f19

  • SHA512

    39a956a8846188de0692fff9181db3b88d1b417de14c6f88eb8735c7d6cacb02cc08e73e2d057ab0545de33ca68766a12dad5eb43a41569347242c69cf657c6b

  • SSDEEP

    3072:WNTT9k5qcFp7ahi8kpI0bbEgLLbxg5ZKbLQSiS8jPysTL:hmi8kGmbEWLbxg5wLQa8jPl

Malware Config

Extracted

Family

xtremerat

C2

xxtreme.no-ip.org

Targets

    • Target

      JaffaCakes118_26f432cc54b00eb694664f120d68dd6f

    • Size

      116KB

    • MD5

      26f432cc54b00eb694664f120d68dd6f

    • SHA1

      b077c9c1a4552bdc46796465b94e5bda0ad8280e

    • SHA256

      ba518fc769aadcb2a6ad511a67536050d1148f45739374883bf8138c858c9f19

    • SHA512

      39a956a8846188de0692fff9181db3b88d1b417de14c6f88eb8735c7d6cacb02cc08e73e2d057ab0545de33ca68766a12dad5eb43a41569347242c69cf657c6b

    • SSDEEP

      3072:WNTT9k5qcFp7ahi8kpI0bbEgLLbxg5ZKbLQSiS8jPysTL:hmi8kGmbEWLbxg5wLQa8jPl

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks