General

  • Target

    fabf76b2290ce3b070f4f862ff5b08bc_JaffaCakes118

  • Size

    285KB

  • Sample

    241218-j1dj3asjfr

  • MD5

    fabf76b2290ce3b070f4f862ff5b08bc

  • SHA1

    7670a3a7da38e212019fe190670ca4836e6e86e4

  • SHA256

    afd1d5c7b1f700bef94a6ae16aad7da36cd48720ffc475665d97ed06b32353d4

  • SHA512

    ae57174baab6af6ace7ae36d2938e10c5268141815d8a50deefc77e1fddd3a1feb6b9647a08807a8a468160411709f529cad4e7c37f3e5bb36fa92344ba7614f

  • SSDEEP

    6144:F2m6Q3jf9iKjyPPow2tampwBWT57wXpgtJKaasCuAWC4:TMKjwP6DpwBg7KCHKa4uAWC4

Malware Config

Targets

    • Target

      fabf76b2290ce3b070f4f862ff5b08bc_JaffaCakes118

    • Size

      285KB

    • MD5

      fabf76b2290ce3b070f4f862ff5b08bc

    • SHA1

      7670a3a7da38e212019fe190670ca4836e6e86e4

    • SHA256

      afd1d5c7b1f700bef94a6ae16aad7da36cd48720ffc475665d97ed06b32353d4

    • SHA512

      ae57174baab6af6ace7ae36d2938e10c5268141815d8a50deefc77e1fddd3a1feb6b9647a08807a8a468160411709f529cad4e7c37f3e5bb36fa92344ba7614f

    • SSDEEP

      6144:F2m6Q3jf9iKjyPPow2tampwBWT57wXpgtJKaasCuAWC4:TMKjwP6DpwBg7KCHKa4uAWC4

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks