General

  • Target

    JaffaCakes118_da0af3e686fed546be5b6b72c8fa73c5

  • Size

    657KB

  • Sample

    250210-lnx42sxlhr

  • MD5

    da0af3e686fed546be5b6b72c8fa73c5

  • SHA1

    797d25724f0bbb12a041f71ed1b5c16760cc8ddf

  • SHA256

    a9b9158a681ab964207ef6871fa876524fa389fafd7daa7c0f3ee93662a55c73

  • SHA512

    339df2d46ee03ce9b66c86f9f569d5fc0197c33382328158fb5a524ee983fb3ae0ee6248297aec597328445b3ee73d0721d969056c02aca0b75cfded409ef3c9

  • SSDEEP

    12288:/7CfKaEtRqYvd4i+JKX4vHbvoQ2BZzZ8jnDawtaCqUHB2UhOXgTrP1:/7htki+JKIv8QmZzZ8jDay1qUhzegTr9

Malware Config

Extracted

Family

xtremerat

C2

korcerrah.no-ip.biz

Targets

    • Target

      JaffaCakes118_da0af3e686fed546be5b6b72c8fa73c5

    • Size

      657KB

    • MD5

      da0af3e686fed546be5b6b72c8fa73c5

    • SHA1

      797d25724f0bbb12a041f71ed1b5c16760cc8ddf

    • SHA256

      a9b9158a681ab964207ef6871fa876524fa389fafd7daa7c0f3ee93662a55c73

    • SHA512

      339df2d46ee03ce9b66c86f9f569d5fc0197c33382328158fb5a524ee983fb3ae0ee6248297aec597328445b3ee73d0721d969056c02aca0b75cfded409ef3c9

    • SSDEEP

      12288:/7CfKaEtRqYvd4i+JKX4vHbvoQ2BZzZ8jnDawtaCqUHB2UhOXgTrP1:/7htki+JKIv8QmZzZ8jDay1qUhzegTr9

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks