General

  • Target

    2054e0f6879b5132b16f162ac74fec4e_JaffaCakes118

  • Size

    347KB

  • Sample

    241008-jcfphswanl

  • MD5

    2054e0f6879b5132b16f162ac74fec4e

  • SHA1

    2029dfbd5faef53fcfa1b4a74b0218fc347df189

  • SHA256

    f01d0d3b9fdc9a82e2c047489d1e52960f46cced8273b16489743cc2f62d65da

  • SHA512

    f471bc0171b5a02970876e25786b297998d2bdcc2d13d580ee6051c9053d2a7cbb1d2e29288425fbeb8c26a07438b2d453d2e0e6dc291a499d740b61f0e7bf1b

  • SSDEEP

    6144:0ZuwGi39bfWSAERocPiGNhh5jMTykSmgOfgR44KmByM:qj9DWStvPiGNb5ITgm5Z47

Malware Config

Targets

    • Target

      2054e0f6879b5132b16f162ac74fec4e_JaffaCakes118

    • Size

      347KB

    • MD5

      2054e0f6879b5132b16f162ac74fec4e

    • SHA1

      2029dfbd5faef53fcfa1b4a74b0218fc347df189

    • SHA256

      f01d0d3b9fdc9a82e2c047489d1e52960f46cced8273b16489743cc2f62d65da

    • SHA512

      f471bc0171b5a02970876e25786b297998d2bdcc2d13d580ee6051c9053d2a7cbb1d2e29288425fbeb8c26a07438b2d453d2e0e6dc291a499d740b61f0e7bf1b

    • SSDEEP

      6144:0ZuwGi39bfWSAERocPiGNhh5jMTykSmgOfgR44KmByM:qj9DWStvPiGNb5ITgm5Z47

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks