General

  • Target

    7805f6e99077a77c43e04de1b2ae6264_JaffaCakes118

  • Size

    677KB

  • Sample

    240727-nfx57azdjg

  • MD5

    7805f6e99077a77c43e04de1b2ae6264

  • SHA1

    0a1d7374563f7d84d03722e9a65a8352f9600bb2

  • SHA256

    4a92d53218100cf40e11c05ada1deaf553b7a7bc5019982603275549bc2203d0

  • SHA512

    fac6d2e1f830f420457a46d33a30288b818898c778ebfcb738ac310b6b682029ac1fc294ed0a0ad425d948e255ff980b03821aea51d5cadc0103051defe2fa82

  • SSDEEP

    12288:Gc1TvbfY/dYXbOEZwcuOyhzBqAg3F5MZifw4Fxy7NXOtFecVcmDkx9vgg:Gc1TbadmZiOyhlqAo5MZbeA7CF3Vk/

Malware Config

Targets

    • Target

      7805f6e99077a77c43e04de1b2ae6264_JaffaCakes118

    • Size

      677KB

    • MD5

      7805f6e99077a77c43e04de1b2ae6264

    • SHA1

      0a1d7374563f7d84d03722e9a65a8352f9600bb2

    • SHA256

      4a92d53218100cf40e11c05ada1deaf553b7a7bc5019982603275549bc2203d0

    • SHA512

      fac6d2e1f830f420457a46d33a30288b818898c778ebfcb738ac310b6b682029ac1fc294ed0a0ad425d948e255ff980b03821aea51d5cadc0103051defe2fa82

    • SSDEEP

      12288:Gc1TvbfY/dYXbOEZwcuOyhzBqAg3F5MZifw4Fxy7NXOtFecVcmDkx9vgg:Gc1TbadmZiOyhlqAo5MZbeA7CF3Vk/

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks