General

  • Target

    JaffaCakes118_b1dbc1a9eaec14bf7b5118d78bbeca1e

  • Size

    26KB

  • Sample

    250412-lqklqssta1

  • MD5

    b1dbc1a9eaec14bf7b5118d78bbeca1e

  • SHA1

    ed9c0775f6e79295bb266493d1ffd26773a0fd50

  • SHA256

    0d295b57418a514f0bcfccc39ae92d877cddd44e93acaa53b6f1757d6d55507c

  • SHA512

    4f1dee191041a292306b40484c3fcb97bdfd97c64cc06ecfe2a8b6571cc2cbd72173fdc69da5d9c09c5c23cccac6122423b758d75a146b9b81c9e70c9c86502f

  • SSDEEP

    384:/pj7eNmfp+UrM8j3Mk8mw2Qwz9cEVWNuOuuOYPq8P9iYwbzuplExSlkZMk3Hbr3:KmfpbM8j8wQwz9caAuxYyurlExjMk3H

Malware Config

Extracted

Family

xtremerat

C2

scdscd.no-ip.biz

Targets

    • Target

      JaffaCakes118_b1dbc1a9eaec14bf7b5118d78bbeca1e

    • Size

      26KB

    • MD5

      b1dbc1a9eaec14bf7b5118d78bbeca1e

    • SHA1

      ed9c0775f6e79295bb266493d1ffd26773a0fd50

    • SHA256

      0d295b57418a514f0bcfccc39ae92d877cddd44e93acaa53b6f1757d6d55507c

    • SHA512

      4f1dee191041a292306b40484c3fcb97bdfd97c64cc06ecfe2a8b6571cc2cbd72173fdc69da5d9c09c5c23cccac6122423b758d75a146b9b81c9e70c9c86502f

    • SSDEEP

      384:/pj7eNmfp+UrM8j3Mk8mw2Qwz9cEVWNuOuuOYPq8P9iYwbzuplExSlkZMk3Hbr3:KmfpbM8j8wQwz9caAuxYyurlExjMk3H

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks