General

  • Target

    5fb0dd20ac2ee909edbd8ad1f83a5818_JaffaCakes118

  • Size

    45KB

  • Sample

    240720-j135qatdmr

  • MD5

    5fb0dd20ac2ee909edbd8ad1f83a5818

  • SHA1

    14d95bec0b37b26ad4cdbaa12069c750ad04577c

  • SHA256

    fc2d7bd89e7f182119e701302233ba991c10aacdee9adf675914fbbf1780d963

  • SHA512

    f9a1f0cbab37f6baf806297067ceab1fdb28cef4331433fb6095943a264ed0c6c3f6ae55aa4ebda108023d903bc3b78a60b42d05fcae7daabd094086f8bf0d31

  • SSDEEP

    768:9Br+tjFY90iY6W1jwmDzKgEFQXaklMIAnH8hwfOgw0cezodC:jyRh31jxPEFQXak+H84bnoU

Malware Config

Targets

    • Target

      5fb0dd20ac2ee909edbd8ad1f83a5818_JaffaCakes118

    • Size

      45KB

    • MD5

      5fb0dd20ac2ee909edbd8ad1f83a5818

    • SHA1

      14d95bec0b37b26ad4cdbaa12069c750ad04577c

    • SHA256

      fc2d7bd89e7f182119e701302233ba991c10aacdee9adf675914fbbf1780d963

    • SHA512

      f9a1f0cbab37f6baf806297067ceab1fdb28cef4331433fb6095943a264ed0c6c3f6ae55aa4ebda108023d903bc3b78a60b42d05fcae7daabd094086f8bf0d31

    • SSDEEP

      768:9Br+tjFY90iY6W1jwmDzKgEFQXaklMIAnH8hwfOgw0cezodC:jyRh31jxPEFQXak+H84bnoU

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks