General

  • Target

    JaffaCakes118_c4d68b8c618bfad2459943e06f1f177c

  • Size

    647KB

  • Sample

    250208-tkfdtsvqgj

  • MD5

    c4d68b8c618bfad2459943e06f1f177c

  • SHA1

    617ebff247f2e94f6ad3121e431cadf546cd3af6

  • SHA256

    a45fd35b5abaa6f5336e7be70633ad6835b9010260c7da463d196279866ddd9b

  • SHA512

    a032c036b40a4b9db2313ffc71a41d064f07569de87a7798c3bf9fdc85236b8a611354be0b4f60c63171b5e0aa06202648d9137b3cc2759dc3c8478c0bb69eb5

  • SSDEEP

    12288:dc2zkJ/kM/0PNyPWUCK/lGRgOUqmq9kR6lhKXLvRBF8eYF83r8:dc2A5s1K/cRgOnmq9g6m3F8eYC78

Malware Config

Extracted

Family

xtremerat

C2

surrogates7.no-ip.org

Targets

    • Target

      JaffaCakes118_c4d68b8c618bfad2459943e06f1f177c

    • Size

      647KB

    • MD5

      c4d68b8c618bfad2459943e06f1f177c

    • SHA1

      617ebff247f2e94f6ad3121e431cadf546cd3af6

    • SHA256

      a45fd35b5abaa6f5336e7be70633ad6835b9010260c7da463d196279866ddd9b

    • SHA512

      a032c036b40a4b9db2313ffc71a41d064f07569de87a7798c3bf9fdc85236b8a611354be0b4f60c63171b5e0aa06202648d9137b3cc2759dc3c8478c0bb69eb5

    • SSDEEP

      12288:dc2zkJ/kM/0PNyPWUCK/lGRgOUqmq9kR6lhKXLvRBF8eYF83r8:dc2A5s1K/cRgOnmq9g6m3F8eYC78

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Deletes itself

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks