General

  • Target

    JaffaCakes118_b1c5fae1c9c9bfcbf404ee77d8b75f55

  • Size

    436KB

  • Sample

    250412-k49x4s1yd1

  • MD5

    b1c5fae1c9c9bfcbf404ee77d8b75f55

  • SHA1

    677644bf44c131211d96b317c2d156f748aa73f2

  • SHA256

    688fd01cfe4002cfa253a19cdea3d021d2bc99b5883594e8ab77d9b0a5c817ab

  • SHA512

    156cdaed9505900d854fbae58178d24c7c65071861346be46d7e1a17c1557b57a3d3e8e552307878dad38876492fc41ab00deabb3b14b3986271fada1a2d6b1a

  • SSDEEP

    12288:eoLwNZ2hwIU6ki8rxLqohFPjcKcPxyRxvLCU:wNZj6z8rxLq66peFLCU

Malware Config

Extracted

Family

xtremerat

C2

xialscox.no-ip.org

$xialscox.no-ip.org

Targets

    • Target

      manifest.rtf.scr

    • Size

      907KB

    • MD5

      71c5d618ca7c23f9a047a09ff1e85439

    • SHA1

      94a8f295935cad0cd03017b23ce115931f7c13f6

    • SHA256

      0e9b42ef9a5663d38c5cf3161488086a36e04834a6b231bf87486efa56081e3a

    • SHA512

      950683cb16158c461a68cc61f890492492d9eb25a2fd4a0712ded084d1d4b98dbcef80c3de14f0670cc44fd0c68c9cf9252e752a5cbc93b7dcf22f90b141b701

    • SSDEEP

      12288:2hkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4a0CI5YRBuhI0SjxXt3M1h:mRmJkcoQricOIQxiZY1ianaYCuxy1h

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks