General

  • Target

    JaffaCakes118_5f196fc3bd4b0e264c3eac02488f7ff2

  • Size

    121KB

  • Sample

    250130-fqp9bszkc1

  • MD5

    5f196fc3bd4b0e264c3eac02488f7ff2

  • SHA1

    a3e8d91b30bb66d6d7fecf859ae1f74f7c669614

  • SHA256

    673f296dabec3508ab4fceb56ddeebf60de0a64b036cb4148cbf0186252329df

  • SHA512

    c4b728b6156ed2cb15b2ef91f00256ba35db3c03e711980e4d94e861062dc7ebd193d5455955b2f0402ff572020b8673cd403e6b8e0629ecc5a0b9f41f44b817

  • SSDEEP

    3072:7nZvNCi3axsajFVfHfffff3HhffffffffDfz:MLN

Malware Config

Extracted

Family

xtremerat

C2

ayada.no-ip.info

Targets

    • Target

      JaffaCakes118_5f196fc3bd4b0e264c3eac02488f7ff2

    • Size

      121KB

    • MD5

      5f196fc3bd4b0e264c3eac02488f7ff2

    • SHA1

      a3e8d91b30bb66d6d7fecf859ae1f74f7c669614

    • SHA256

      673f296dabec3508ab4fceb56ddeebf60de0a64b036cb4148cbf0186252329df

    • SHA512

      c4b728b6156ed2cb15b2ef91f00256ba35db3c03e711980e4d94e861062dc7ebd193d5455955b2f0402ff572020b8673cd403e6b8e0629ecc5a0b9f41f44b817

    • SSDEEP

      3072:7nZvNCi3axsajFVfHfffff3HhffffffffDfz:MLN

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks