General

  • Target

    87e0378f605590edfc05e5ad45debb27_JaffaCakes118

  • Size

    21KB

  • Sample

    240810-14ysvavelf

  • MD5

    87e0378f605590edfc05e5ad45debb27

  • SHA1

    741d65456e600e82ec2cc1f3f9d3d35bfae73ae1

  • SHA256

    842560b9bcbcc596a957d582fbb7b13568357b9affc1722ff2956220cf3286fb

  • SHA512

    c6eb12328e4ef91e6413b43f9a151cc6ee3ae7f74d71be4c79efa06a8ed394d47624cf4127abfabba3baec75edb5ed039f7ce024b95132d5e8fc35a8ed0844c7

  • SSDEEP

    384:oHkbvZrowDq6mpVIRTMT6rk9H0UNCm0iY07P8abfNFR:FcwDVmjWMuruUUNEO7PpbVb

Malware Config

Targets

    • Target

      87e0378f605590edfc05e5ad45debb27_JaffaCakes118

    • Size

      21KB

    • MD5

      87e0378f605590edfc05e5ad45debb27

    • SHA1

      741d65456e600e82ec2cc1f3f9d3d35bfae73ae1

    • SHA256

      842560b9bcbcc596a957d582fbb7b13568357b9affc1722ff2956220cf3286fb

    • SHA512

      c6eb12328e4ef91e6413b43f9a151cc6ee3ae7f74d71be4c79efa06a8ed394d47624cf4127abfabba3baec75edb5ed039f7ce024b95132d5e8fc35a8ed0844c7

    • SSDEEP

      384:oHkbvZrowDq6mpVIRTMT6rk9H0UNCm0iY07P8abfNFR:FcwDVmjWMuruUUNEO7PpbVb

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks