General

  • Target

    JaffaCakes118_4af585b74294efcce5cf4d80d6ef352b

  • Size

    112KB

  • Sample

    250128-ptg7kaymfy

  • MD5

    4af585b74294efcce5cf4d80d6ef352b

  • SHA1

    8ab2673e30a2eaf81d8babc4d9ebf57f949b5f62

  • SHA256

    3d645f1df6028016ede7b7e242a6feb3dd0ee33d06ad453d89538e8e045d02f9

  • SHA512

    0bc469582fb5bc7d5995c7bed145ba5dbaed5418331190ab9fafd0a6d746f54e6d89c721e0082ae99a5253e0219458af7594041d1ce95d94f9d2a21f4b40af82

  • SSDEEP

    1536:nJEDcQBnD2ha1ZlKUw99Wyiyfiemb9H/OoOhiJ8c0BpB54v1RATcOuA69B:+LBnD2ha1aUQibN2oqtzI1qNOB

Malware Config

Extracted

Family

xtremerat

C2

dannymatrix.no-ip.org

Targets

    • Target

      JaffaCakes118_4af585b74294efcce5cf4d80d6ef352b

    • Size

      112KB

    • MD5

      4af585b74294efcce5cf4d80d6ef352b

    • SHA1

      8ab2673e30a2eaf81d8babc4d9ebf57f949b5f62

    • SHA256

      3d645f1df6028016ede7b7e242a6feb3dd0ee33d06ad453d89538e8e045d02f9

    • SHA512

      0bc469582fb5bc7d5995c7bed145ba5dbaed5418331190ab9fafd0a6d746f54e6d89c721e0082ae99a5253e0219458af7594041d1ce95d94f9d2a21f4b40af82

    • SSDEEP

      1536:nJEDcQBnD2ha1ZlKUw99Wyiyfiemb9H/OoOhiJ8c0BpB54v1RATcOuA69B:+LBnD2ha1aUQibN2oqtzI1qNOB

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks