Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    JaffaCakes118_86514df66b0c23d76eef36239f417d84

  • Size

    204KB

  • Sample

    250322-qxyjdstvh1

  • MD5

    86514df66b0c23d76eef36239f417d84

  • SHA1

    7d6a723931a7c3f584483f887ab79de1effe867a

  • SHA256

    b19f338f30463d4d499d55f5eb6002927a3e8b14ed696ceb38307a0ab1514876

  • SHA512

    fd259c6b4247e31a03148247985496d6199d4ecb06be8463a02f64306ba6ab9e5384e86822beb3040a9293d208b5a167c3ca47274276867627a82c8e234f416e

  • SSDEEP

    6144:Q2o/Hy6GcOZnhJDarxVDcYQhLdgwrr8CA2:Q2e6cgfD0LDcYi2wrVA2

Malware Config

Extracted

Family

xtremerat

C2

hbooob.no-ip.biz

Targets

    • Target

      JaffaCakes118_86514df66b0c23d76eef36239f417d84

    • Size

      204KB

    • MD5

      86514df66b0c23d76eef36239f417d84

    • SHA1

      7d6a723931a7c3f584483f887ab79de1effe867a

    • SHA256

      b19f338f30463d4d499d55f5eb6002927a3e8b14ed696ceb38307a0ab1514876

    • SHA512

      fd259c6b4247e31a03148247985496d6199d4ecb06be8463a02f64306ba6ab9e5384e86822beb3040a9293d208b5a167c3ca47274276867627a82c8e234f416e

    • SSDEEP

      6144:Q2o/Hy6GcOZnhJDarxVDcYQhLdgwrr8CA2:Q2e6cgfD0LDcYi2wrVA2

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks