General

  • Target

    JaffaCakes118_a83a5279d3f9d3af7cf9d2e19eed017d

  • Size

    593KB

  • Sample

    250206-g9m4raxrdp

  • MD5

    a83a5279d3f9d3af7cf9d2e19eed017d

  • SHA1

    00a7f91a74e9fbdf83e3351ab989e15ce452f093

  • SHA256

    6876d2098a793e617e70fde9b63f7fb90b0b48c578d374c0b3d3112ace92e412

  • SHA512

    1f38cdc07b56c8d9e11a664f0d6900a2cc0293ecd50c8df4d8f73f6af328943f51d7391415caf9b305071618a96d404101101a093747452565c1048c2e13d57b

  • SSDEEP

    12288:9euTIgKKM4YrcDCI9j0KGSFon+BN+OGtQiFnXh:ErR1BI9j0TSRXunx

Malware Config

Extracted

Family

xtremerat

C2

momo44.no-ip.biz

Targets

    • Target

      JaffaCakes118_a83a5279d3f9d3af7cf9d2e19eed017d

    • Size

      593KB

    • MD5

      a83a5279d3f9d3af7cf9d2e19eed017d

    • SHA1

      00a7f91a74e9fbdf83e3351ab989e15ce452f093

    • SHA256

      6876d2098a793e617e70fde9b63f7fb90b0b48c578d374c0b3d3112ace92e412

    • SHA512

      1f38cdc07b56c8d9e11a664f0d6900a2cc0293ecd50c8df4d8f73f6af328943f51d7391415caf9b305071618a96d404101101a093747452565c1048c2e13d57b

    • SSDEEP

      12288:9euTIgKKM4YrcDCI9j0KGSFon+BN+OGtQiFnXh:ErR1BI9j0TSRXunx

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.