General

  • Target

    JaffaCakes118_4708ece1802d61ef3fdc620134b960e1

  • Size

    25KB

  • Sample

    250128-fe873ayjbm

  • MD5

    4708ece1802d61ef3fdc620134b960e1

  • SHA1

    1f8a84da1fc3cecc4d1ba2f951d92f6b62828f4b

  • SHA256

    3db790e11b94c8259a39623b0ab4a70dda8a8d67c14e69755213f107d976ada1

  • SHA512

    6e1344de6f728d9094c6b163534fda362745586e3b18bc339105796f26e5ae46db8e4967cfabcdb7aa7a6c9bd3611d1068c14071dbb5c9dc906e4960a319ea77

  • SSDEEP

    384:xLpj7eNmfp+UrM8j3Mk8mw2Qwz9cEVWNuOuuOYPq8P9iYwbzuvExgRW2r3p:xmmfpbM8j8wQwz9caAuxYyuJExrS

Malware Config

Extracted

Family

xtremerat

C2

momed.no-ip.info

Targets

    • Target

      JaffaCakes118_4708ece1802d61ef3fdc620134b960e1

    • Size

      25KB

    • MD5

      4708ece1802d61ef3fdc620134b960e1

    • SHA1

      1f8a84da1fc3cecc4d1ba2f951d92f6b62828f4b

    • SHA256

      3db790e11b94c8259a39623b0ab4a70dda8a8d67c14e69755213f107d976ada1

    • SHA512

      6e1344de6f728d9094c6b163534fda362745586e3b18bc339105796f26e5ae46db8e4967cfabcdb7aa7a6c9bd3611d1068c14071dbb5c9dc906e4960a319ea77

    • SSDEEP

      384:xLpj7eNmfp+UrM8j3Mk8mw2Qwz9cEVWNuOuuOYPq8P9iYwbzuvExgRW2r3p:xmmfpbM8j8wQwz9caAuxYyuJExrS

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks