General

  • Target

    JaffaCakes118_40d95f0aae2b8cfaaa5d7c1d30b2e5eb

  • Size

    621KB

  • Sample

    250101-avvrqaznal

  • MD5

    40d95f0aae2b8cfaaa5d7c1d30b2e5eb

  • SHA1

    e5ab01d677560b0b4136b3a2197096360d0d66fd

  • SHA256

    1be1e3c54902c2fa8481888505ec900185231713ed07fc85e140f489965f6855

  • SHA512

    926220911b2176443bc6392d7fbe3727f3de37e1660e8e5e6cc7d2d600b38c3ce46d81d2e1d1d6a7c7637c402afab9c7ed0791187360012ff8d9d31f8f049936

  • SSDEEP

    12288:Z4BL/9Z2VngICLCi+wLquqMBBUsebeFZnbXCQJiI:ZKlZ3IK+Eqib86nTTs

Malware Config

Targets

    • Target

      JaffaCakes118_40d95f0aae2b8cfaaa5d7c1d30b2e5eb

    • Size

      621KB

    • MD5

      40d95f0aae2b8cfaaa5d7c1d30b2e5eb

    • SHA1

      e5ab01d677560b0b4136b3a2197096360d0d66fd

    • SHA256

      1be1e3c54902c2fa8481888505ec900185231713ed07fc85e140f489965f6855

    • SHA512

      926220911b2176443bc6392d7fbe3727f3de37e1660e8e5e6cc7d2d600b38c3ce46d81d2e1d1d6a7c7637c402afab9c7ed0791187360012ff8d9d31f8f049936

    • SSDEEP

      12288:Z4BL/9Z2VngICLCi+wLquqMBBUsebeFZnbXCQJiI:ZKlZ3IK+Eqib86nTTs

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks