General

  • Target

    2a4e877286a081781c052bc9cb0fa2d3_JaffaCakes118

  • Size

    286KB

  • Sample

    240708-akjlpsvhna

  • MD5

    2a4e877286a081781c052bc9cb0fa2d3

  • SHA1

    55f21bd29a5357b8fe13a23869d2a4028a82b3d8

  • SHA256

    19a093712247513f549f74722b7e2f27d7f7ca6397aec49a12745bcffe52edd5

  • SHA512

    e402b168d386b7bf68d860998b50965865628e1425915de85aeebb177cae3e57b9ba79ebf6766ee87cbd2dd25bd24b9ad52a5b78e37065b3f0ffca84ca49a653

  • SSDEEP

    6144:fMkIgkaa4QDq4NWlwDWL/snc1eAnVW5GJZ2tNYLj8MfsCTOAK3px:t9kae3BDveeQVzYKj86sCCA6px

Malware Config

Extracted

Family

xtremerat

C2

youcefsa.no-ip.biz

youcefza.no-ip.biz

Targets

    • Target

      2a4e877286a081781c052bc9cb0fa2d3_JaffaCakes118

    • Size

      286KB

    • MD5

      2a4e877286a081781c052bc9cb0fa2d3

    • SHA1

      55f21bd29a5357b8fe13a23869d2a4028a82b3d8

    • SHA256

      19a093712247513f549f74722b7e2f27d7f7ca6397aec49a12745bcffe52edd5

    • SHA512

      e402b168d386b7bf68d860998b50965865628e1425915de85aeebb177cae3e57b9ba79ebf6766ee87cbd2dd25bd24b9ad52a5b78e37065b3f0ffca84ca49a653

    • SSDEEP

      6144:fMkIgkaa4QDq4NWlwDWL/snc1eAnVW5GJZ2tNYLj8MfsCTOAK3px:t9kae3BDveeQVzYKj86sCCA6px

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

System Information Discovery

1
T1082

Tasks