General

  • Target

    173a9121f7713037c6500f589658c7e5_JaffaCakes118

  • Size

    19KB

  • Sample

    240627-x3mseawepg

  • MD5

    173a9121f7713037c6500f589658c7e5

  • SHA1

    419c0c55eecc8ff679059e5049bb23ee2049a995

  • SHA256

    ef272a7bcdd2c0d0f7953a1688e2a396ea5abedf6298a7141e111603b821b8c4

  • SHA512

    41d16b8574fcebb99be294fdf6fe89e311262048bf02e99d5d577b6a295abacb0ee9c778c6530ab85d2758ff3a962b67e958e5342163266cf6b8c83ca28de270

  • SSDEEP

    384:OHkbvZrowDq6mpVIRTMT6rk9H0UNCITiY07P8aketR:/cwDVmjWMuruUUNlO7P5ku

Malware Config

Targets

    • Target

      173a9121f7713037c6500f589658c7e5_JaffaCakes118

    • Size

      19KB

    • MD5

      173a9121f7713037c6500f589658c7e5

    • SHA1

      419c0c55eecc8ff679059e5049bb23ee2049a995

    • SHA256

      ef272a7bcdd2c0d0f7953a1688e2a396ea5abedf6298a7141e111603b821b8c4

    • SHA512

      41d16b8574fcebb99be294fdf6fe89e311262048bf02e99d5d577b6a295abacb0ee9c778c6530ab85d2758ff3a962b67e958e5342163266cf6b8c83ca28de270

    • SSDEEP

      384:OHkbvZrowDq6mpVIRTMT6rk9H0UNCITiY07P8aketR:/cwDVmjWMuruUUNlO7P5ku

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks