General

  • Target

    a430d926ef045f2ec2e2439302053f7d_JaffaCakes118

  • Size

    340KB

  • Sample

    240817-z9mgbszhkq

  • MD5

    a430d926ef045f2ec2e2439302053f7d

  • SHA1

    4d3d490414b840d0072fbcf68284f47fc5ebce0b

  • SHA256

    90aada4f64c80f507f5a92d9d10166310b564f1e3dcb0f76c8c9e757ccb55781

  • SHA512

    52550a821567ac76e73230ebb6111a9ca69dd29ae5891fdfc4f51aa9ab0e8f1608d7e37f6237b5bf51986bec89e36fffd6cb1673ac0baef01a871e2e87e737da

  • SSDEEP

    6144:lYYIIHSmpwgcidoKBp59AAjTHUlalRAr1P0JFdAjJf6GRxyJoh51yXmGiT:iGz+d4jAQHUlWRw1P0Jm5RxH5xGiT

Malware Config

Targets

    • Target

      a430d926ef045f2ec2e2439302053f7d_JaffaCakes118

    • Size

      340KB

    • MD5

      a430d926ef045f2ec2e2439302053f7d

    • SHA1

      4d3d490414b840d0072fbcf68284f47fc5ebce0b

    • SHA256

      90aada4f64c80f507f5a92d9d10166310b564f1e3dcb0f76c8c9e757ccb55781

    • SHA512

      52550a821567ac76e73230ebb6111a9ca69dd29ae5891fdfc4f51aa9ab0e8f1608d7e37f6237b5bf51986bec89e36fffd6cb1673ac0baef01a871e2e87e737da

    • SSDEEP

      6144:lYYIIHSmpwgcidoKBp59AAjTHUlalRAr1P0JFdAjJf6GRxyJoh51yXmGiT:iGz+d4jAQHUlWRw1P0Jm5RxH5xGiT

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks