General

  • Target

    0d2c40e8ada19fca5d2a8d6f09b09010_JaffaCakes118

  • Size

    75KB

  • Sample

    240625-h3xkaawdlg

  • MD5

    0d2c40e8ada19fca5d2a8d6f09b09010

  • SHA1

    22c1171af9357d271d328788524e706f9202cb70

  • SHA256

    cbc1a768ce3446a789d5b09e4f90d02aa00bb6408ebaf0cb6161bfd33a232b85

  • SHA512

    68f7ad8481dd31af04da616e9fded5a83fd07130a9b84584793ade7a6d9d83d73931c1790dfdc89ec0da994eff91d15cd6b5053ff064ad2c4e6f4912b5b5ec42

  • SSDEEP

    768:/E9hghdN12Ozhiow2Gkm6+c3/6IzozyaZOp6903v6:/u+zMOlw2GkmS3yAoi+8

Malware Config

Targets

    • Target

      0d2c40e8ada19fca5d2a8d6f09b09010_JaffaCakes118

    • Size

      75KB

    • MD5

      0d2c40e8ada19fca5d2a8d6f09b09010

    • SHA1

      22c1171af9357d271d328788524e706f9202cb70

    • SHA256

      cbc1a768ce3446a789d5b09e4f90d02aa00bb6408ebaf0cb6161bfd33a232b85

    • SHA512

      68f7ad8481dd31af04da616e9fded5a83fd07130a9b84584793ade7a6d9d83d73931c1790dfdc89ec0da994eff91d15cd6b5053ff064ad2c4e6f4912b5b5ec42

    • SSDEEP

      768:/E9hghdN12Ozhiow2Gkm6+c3/6IzozyaZOp6903v6:/u+zMOlw2GkmS3yAoi+8

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks