General

  • Target

    c0ec830b378c0af9783d316117e403c0_JaffaCakes118

  • Size

    105KB

  • Sample

    241204-fmr9hsykhl

  • MD5

    c0ec830b378c0af9783d316117e403c0

  • SHA1

    e2bfe952fde53cf002e51bd8f6afbc1ef5da95c0

  • SHA256

    b8022ad047a9e0ccd05314100fabd1c9184d89d805f9768cf520742317043081

  • SHA512

    bab75dc45c41517cd846196f5b09f924bbdd8eecb636d8b08a51fc292934eca1a6b33bea32691dd5403137356a5e1addd986da22803ad85730cbdf47cea957fc

  • SSDEEP

    1536:LiR4fs+rVOni3QZlNUhC/W+9ialIGFvI7lvQztufuaqRb+Tl1Q8UsK0Y:L31Z93QZ80v9iCIh4xvaqb+Z1NK0Y

Malware Config

Targets

    • Target

      c0ec830b378c0af9783d316117e403c0_JaffaCakes118

    • Size

      105KB

    • MD5

      c0ec830b378c0af9783d316117e403c0

    • SHA1

      e2bfe952fde53cf002e51bd8f6afbc1ef5da95c0

    • SHA256

      b8022ad047a9e0ccd05314100fabd1c9184d89d805f9768cf520742317043081

    • SHA512

      bab75dc45c41517cd846196f5b09f924bbdd8eecb636d8b08a51fc292934eca1a6b33bea32691dd5403137356a5e1addd986da22803ad85730cbdf47cea957fc

    • SSDEEP

      1536:LiR4fs+rVOni3QZlNUhC/W+9ialIGFvI7lvQztufuaqRb+Tl1Q8UsK0Y:L31Z93QZ80v9iCIh4xvaqb+Z1NK0Y

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks