General

  • Target

    JaffaCakes118_b60c6bc455f1f2c317ca9758554895e5

  • Size

    184KB

  • Sample

    250413-3pg8nawzby

  • MD5

    b60c6bc455f1f2c317ca9758554895e5

  • SHA1

    4ce05d7a75622be2cfe3c4c300d327f2a0c3d78f

  • SHA256

    29563bb280effd8538bcd95c9debc65447a4c17856d949771c15822a05980f86

  • SHA512

    c27eafa0b084f1f9580220b2ec88d80572ebb883f39d10d25da4cf4af58ef8a4e927bab2c53a9ff84f66debd543abf0a50b2f0973d4e7c68acad09a9ef04ff54

  • SSDEEP

    3072:fN9fU+4gkv5CgZ3k+uGTMUQhLQK965LlgdpB29jrgc2dMQ:AIkv5538UpxdlgdpYtO

Malware Config

Extracted

Family

xtremerat

C2

r3dz80.no-ip.info

Targets

    • Target

      JaffaCakes118_b60c6bc455f1f2c317ca9758554895e5

    • Size

      184KB

    • MD5

      b60c6bc455f1f2c317ca9758554895e5

    • SHA1

      4ce05d7a75622be2cfe3c4c300d327f2a0c3d78f

    • SHA256

      29563bb280effd8538bcd95c9debc65447a4c17856d949771c15822a05980f86

    • SHA512

      c27eafa0b084f1f9580220b2ec88d80572ebb883f39d10d25da4cf4af58ef8a4e927bab2c53a9ff84f66debd543abf0a50b2f0973d4e7c68acad09a9ef04ff54

    • SSDEEP

      3072:fN9fU+4gkv5CgZ3k+uGTMUQhLQK965LlgdpB29jrgc2dMQ:AIkv5538UpxdlgdpYtO

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.