General

  • Target

    JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4

  • Size

    809KB

  • Sample

    250127-y5dsystrav

  • MD5

    435b72cfbf939eb1f32f3d2f528e21c4

  • SHA1

    f0320c280a25f03301586d1acd84edc9247d3da0

  • SHA256

    2fe90d9427c800ef20af4d2987c95b602a47a82ca42a39b9e9c8ea82f109054a

  • SHA512

    c726a5be311889f086091e2b622f66f6f6bf4a22ca0d8a57844ab1ae83ec0d964bbe8dbfae61b661aaf824ba0a6c120dae5ebf9cad7b85a376d908fe188abcaa

  • SSDEEP

    12288:OuXdjyfHShflT8ZfMfHS3HHiL9QHB11hJ2BHjyDNT9Zs3Aym8Gm:OAyfHSMZU/siBKhJ2BHG9ZsQyme

Malware Config

Extracted

Family

xtremerat

C2

mikropbisey.no-ip.biz

Targets

    • Target

      JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4

    • Size

      809KB

    • MD5

      435b72cfbf939eb1f32f3d2f528e21c4

    • SHA1

      f0320c280a25f03301586d1acd84edc9247d3da0

    • SHA256

      2fe90d9427c800ef20af4d2987c95b602a47a82ca42a39b9e9c8ea82f109054a

    • SHA512

      c726a5be311889f086091e2b622f66f6f6bf4a22ca0d8a57844ab1ae83ec0d964bbe8dbfae61b661aaf824ba0a6c120dae5ebf9cad7b85a376d908fe188abcaa

    • SSDEEP

      12288:OuXdjyfHShflT8ZfMfHS3HHiL9QHB11hJ2BHjyDNT9Zs3Aym8Gm:OAyfHSMZU/siBKhJ2BHG9ZsQyme

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks