General

  • Target

    JaffaCakes118_1d4876957c7273b09848839d7f9161fa

  • Size

    300KB

  • Sample

    250223-awqt6atkaq

  • MD5

    1d4876957c7273b09848839d7f9161fa

  • SHA1

    6fce17d554492814fc8b603c79ea20932caecbff

  • SHA256

    1a4755ba998b10a4a4f0db268e4324af1453c9c6d1e12998275116e691eeb850

  • SHA512

    8964ceb8e3d006192de58caf5703cd1fc7d0b3359901a898ec0b3a599029f109c058c91c48df580724287ee7348495254395b5476544890ba71ee2ed84687841

  • SSDEEP

    6144:BxOZDEYse1072Y1VjBgjcPAG/rFbYTs9IMuLq3MgqjoG53O:tYsx2Y1VjBgjANDFqsyjoY+

Malware Config

Extracted

Family

xtremerat

C2

ro1or.zapto.org

Targets

    • Target

      JaffaCakes118_1d4876957c7273b09848839d7f9161fa

    • Size

      300KB

    • MD5

      1d4876957c7273b09848839d7f9161fa

    • SHA1

      6fce17d554492814fc8b603c79ea20932caecbff

    • SHA256

      1a4755ba998b10a4a4f0db268e4324af1453c9c6d1e12998275116e691eeb850

    • SHA512

      8964ceb8e3d006192de58caf5703cd1fc7d0b3359901a898ec0b3a599029f109c058c91c48df580724287ee7348495254395b5476544890ba71ee2ed84687841

    • SSDEEP

      6144:BxOZDEYse1072Y1VjBgjcPAG/rFbYTs9IMuLq3MgqjoG53O:tYsx2Y1VjBgjANDFqsyjoY+

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks