General

  • Target

    8c43ba596e217e1ec2770f189065c394_JaffaCakes118

  • Size

    40KB

  • Sample

    241103-tacvysxkby

  • MD5

    8c43ba596e217e1ec2770f189065c394

  • SHA1

    676510b07474fe48c7d9883a4307000556401b28

  • SHA256

    b5c65b9de6adfb705887dc2346f41e649fcf977fdac33ce0afca327d1105daab

  • SHA512

    a2a2ae7297d85c3cfd2322ae7e3182b1d484a68fcc27495483ff473b2b4c608cb78b3ed4234e60dd9112ca5d59f3b05ec39e401d47d8ae7d34e510fbb0bcd8cc

  • SSDEEP

    768:NE9hYh7Nq2Ozhiow2Gkm6Bcn/9fzNBwIldwbzosd:Nu2hzOlw2GkmXnBBldw/ok

Malware Config

Targets

    • Target

      8c43ba596e217e1ec2770f189065c394_JaffaCakes118

    • Size

      40KB

    • MD5

      8c43ba596e217e1ec2770f189065c394

    • SHA1

      676510b07474fe48c7d9883a4307000556401b28

    • SHA256

      b5c65b9de6adfb705887dc2346f41e649fcf977fdac33ce0afca327d1105daab

    • SHA512

      a2a2ae7297d85c3cfd2322ae7e3182b1d484a68fcc27495483ff473b2b4c608cb78b3ed4234e60dd9112ca5d59f3b05ec39e401d47d8ae7d34e510fbb0bcd8cc

    • SSDEEP

      768:NE9hYh7Nq2Ozhiow2Gkm6Bcn/9fzNBwIldwbzosd:Nu2hzOlw2GkmXnBBldw/ok

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks