General

  • Target

    3c2647f2c7aa358dcfc988c28c7b79d3_JaffaCakes118

  • Size

    507KB

  • Sample

    241012-1gefpaxajp

  • MD5

    3c2647f2c7aa358dcfc988c28c7b79d3

  • SHA1

    77b4f798d64ea6f5c65cbdd34145a6824e37308d

  • SHA256

    aa22421d1b847405029788674549a5ae9bb82d77a704f544ac2f5c3f1b7a69df

  • SHA512

    9ca6ecaa749da72f2b8e12b35c0c9bb70c981a7478efb84061b92a31af2b2f1f816103534713fc852fc9796324dd0d32f0071e41bf7f028bdb8e919eeae7fc44

  • SSDEEP

    12288:LXsHAUMGb8XPxJjYW07nOKFYGq6JMQLjGIE2Asv:pUMGb8XPxJkjOmYy2QLjRE2f

Malware Config

Targets

    • Target

      3c2647f2c7aa358dcfc988c28c7b79d3_JaffaCakes118

    • Size

      507KB

    • MD5

      3c2647f2c7aa358dcfc988c28c7b79d3

    • SHA1

      77b4f798d64ea6f5c65cbdd34145a6824e37308d

    • SHA256

      aa22421d1b847405029788674549a5ae9bb82d77a704f544ac2f5c3f1b7a69df

    • SHA512

      9ca6ecaa749da72f2b8e12b35c0c9bb70c981a7478efb84061b92a31af2b2f1f816103534713fc852fc9796324dd0d32f0071e41bf7f028bdb8e919eeae7fc44

    • SSDEEP

      12288:LXsHAUMGb8XPxJjYW07nOKFYGq6JMQLjGIE2Asv:pUMGb8XPxJkjOmYy2QLjRE2f

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks