General

  • Target

    JaffaCakes118_0a803a4ab0b95c898fd81e79e1d71da3

  • Size

    52KB

  • Sample

    250220-jf3cpa1px4

  • MD5

    0a803a4ab0b95c898fd81e79e1d71da3

  • SHA1

    62f72fd63c70a9e774fbc9b7cc311d5dfe465665

  • SHA256

    213acf1d7ecd25b6996aa8800d95f220b9a07ea9f8c41a029d87fbf0144e7a61

  • SHA512

    8fcd309b7c73211a73f415ac3eddc991d02b3461af5cc8c220eff328642bdfbdf15773efbe13427bd4da6976c2f50e6035b4e208da0beac14f15824ac72d9a56

  • SSDEEP

    768:gEJ7xLMdyOxVhtJwUTN/XY9MQTzuWYgYPG5Q8cScEHyj:gEYdBRG4Q9XzPlOSzS

Malware Config

Extracted

Family

xtremerat

C2

yesno.no-ip.biz

Targets

    • Target

      JaffaCakes118_0a803a4ab0b95c898fd81e79e1d71da3

    • Size

      52KB

    • MD5

      0a803a4ab0b95c898fd81e79e1d71da3

    • SHA1

      62f72fd63c70a9e774fbc9b7cc311d5dfe465665

    • SHA256

      213acf1d7ecd25b6996aa8800d95f220b9a07ea9f8c41a029d87fbf0144e7a61

    • SHA512

      8fcd309b7c73211a73f415ac3eddc991d02b3461af5cc8c220eff328642bdfbdf15773efbe13427bd4da6976c2f50e6035b4e208da0beac14f15824ac72d9a56

    • SSDEEP

      768:gEJ7xLMdyOxVhtJwUTN/XY9MQTzuWYgYPG5Q8cScEHyj:gEYdBRG4Q9XzPlOSzS

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks