General

  • Target

    4fb0474a5138af4786995d6c23572c5c_JaffaCakes118

  • Size

    388KB

  • Sample

    240716-x1hexawdmm

  • MD5

    4fb0474a5138af4786995d6c23572c5c

  • SHA1

    0e0fa4599ce45ddb42f10b3948b97ef5980d694b

  • SHA256

    1e1245c74250df5554ba0e39c09d75284a8ca71402dcdb7dd27df2a6816d3dee

  • SHA512

    b1b1a8c596e8f68d31d47ee4301e67b2c20b1ce4c926d8594470184891e7d32703954247b293e36f04f3b1c23a4386248c0702f8e6eb0494793a143ed5886489

  • SSDEEP

    6144:0xPZutKuMfll8CKfFCTq2EQZ9k3Y2NZYD:0xRWKNbKfY3EQfQYMYD

Malware Config

Targets

    • Target

      4fb0474a5138af4786995d6c23572c5c_JaffaCakes118

    • Size

      388KB

    • MD5

      4fb0474a5138af4786995d6c23572c5c

    • SHA1

      0e0fa4599ce45ddb42f10b3948b97ef5980d694b

    • SHA256

      1e1245c74250df5554ba0e39c09d75284a8ca71402dcdb7dd27df2a6816d3dee

    • SHA512

      b1b1a8c596e8f68d31d47ee4301e67b2c20b1ce4c926d8594470184891e7d32703954247b293e36f04f3b1c23a4386248c0702f8e6eb0494793a143ed5886489

    • SSDEEP

      6144:0xPZutKuMfll8CKfFCTq2EQZ9k3Y2NZYD:0xRWKNbKfY3EQfQYMYD

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks