General

  • Target

    d5513bbb4cd679385500cbfae8f731ad_JaffaCakes118

  • Size

    19KB

  • Sample

    241208-ffcv9atlez

  • MD5

    d5513bbb4cd679385500cbfae8f731ad

  • SHA1

    2f2b8df0e5f03cdc3fd03c39cb9b17ed3bda1b4f

  • SHA256

    450ec3d990b2bb57dfecdd700fddd1dea7dada39515c1e726c7ec8cbe867387b

  • SHA512

    b69ce940a872a61343b546ad336d46b9009a44c8a81b66c9b285ebc48b84e4ba6029f24c16a44aea26ebef68782ad1133214d2cc88fcbe4ae74302d96acfc926

  • SSDEEP

    384:tHKZfuH87GowDqGoMwevqxP6k6zIDwPVBSuGuwq5wSg7R:YZfuHUvwDKP6kMpPGud5wv

Malware Config

Targets

    • Target

      d5513bbb4cd679385500cbfae8f731ad_JaffaCakes118

    • Size

      19KB

    • MD5

      d5513bbb4cd679385500cbfae8f731ad

    • SHA1

      2f2b8df0e5f03cdc3fd03c39cb9b17ed3bda1b4f

    • SHA256

      450ec3d990b2bb57dfecdd700fddd1dea7dada39515c1e726c7ec8cbe867387b

    • SHA512

      b69ce940a872a61343b546ad336d46b9009a44c8a81b66c9b285ebc48b84e4ba6029f24c16a44aea26ebef68782ad1133214d2cc88fcbe4ae74302d96acfc926

    • SSDEEP

      384:tHKZfuH87GowDqGoMwevqxP6k6zIDwPVBSuGuwq5wSg7R:YZfuHUvwDKP6kMpPGud5wv

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks