General

  • Target

    2dd03951dc80a1c2bf043b2202f5acb0_JaffaCakes118

  • Size

    219KB

  • Sample

    241009-j8fdmaxhqm

  • MD5

    2dd03951dc80a1c2bf043b2202f5acb0

  • SHA1

    771374787516f26f5d157a295a060bc8912e86fc

  • SHA256

    221cc2e2e82ea2cbb775af84c7f2a1c224266465d4b653613d765e5888651eed

  • SHA512

    9dd20569973d2355b02c8058050c15545df8fa8771199d58f847a1afe42adda004ccb32a9b7a0ae50289ec90ec080c398e148bd9c94a3a01e6260cda64e816bd

  • SSDEEP

    6144:CBIs4E0ZZhYjBO9wwqfKmrTDeCXFkvOTMU:wIb6jYqNrvjXFkvOTT

Malware Config

Targets

    • Target

      2dd03951dc80a1c2bf043b2202f5acb0_JaffaCakes118

    • Size

      219KB

    • MD5

      2dd03951dc80a1c2bf043b2202f5acb0

    • SHA1

      771374787516f26f5d157a295a060bc8912e86fc

    • SHA256

      221cc2e2e82ea2cbb775af84c7f2a1c224266465d4b653613d765e5888651eed

    • SHA512

      9dd20569973d2355b02c8058050c15545df8fa8771199d58f847a1afe42adda004ccb32a9b7a0ae50289ec90ec080c398e148bd9c94a3a01e6260cda64e816bd

    • SSDEEP

      6144:CBIs4E0ZZhYjBO9wwqfKmrTDeCXFkvOTMU:wIb6jYqNrvjXFkvOTT

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks