General

  • Target

    JaffaCakes118_7ab423a0c3c7eeb3bb00d130e6b6f9bd

  • Size

    608KB

  • Sample

    250104-t4t2bszlaj

  • MD5

    7ab423a0c3c7eeb3bb00d130e6b6f9bd

  • SHA1

    23ecc0bb28e5c69b5a07cd215e34b2459ffa7f4e

  • SHA256

    209b685ffe19683bfa33f9bb813abe69fd7df5d7260e186d09189d0764b61b5c

  • SHA512

    dc2061ac9a1e7573348ac49514a6c905f3c756e4d5a366001ca76bb604e92f03fe4e967f65f843c82397e74cce938b32cc08261e9b193a91bb58270d291da93e

  • SSDEEP

    12288:52u4sum+hlTEqUZoYX+KdC3R+kFifVucd4lJO2oT+VC/:pKmGlTEZo8eRpFifMK/

Malware Config

Targets

    • Target

      JaffaCakes118_7ab423a0c3c7eeb3bb00d130e6b6f9bd

    • Size

      608KB

    • MD5

      7ab423a0c3c7eeb3bb00d130e6b6f9bd

    • SHA1

      23ecc0bb28e5c69b5a07cd215e34b2459ffa7f4e

    • SHA256

      209b685ffe19683bfa33f9bb813abe69fd7df5d7260e186d09189d0764b61b5c

    • SHA512

      dc2061ac9a1e7573348ac49514a6c905f3c756e4d5a366001ca76bb604e92f03fe4e967f65f843c82397e74cce938b32cc08261e9b193a91bb58270d291da93e

    • SSDEEP

      12288:52u4sum+hlTEqUZoYX+KdC3R+kFifVucd4lJO2oT+VC/:pKmGlTEZo8eRpFifMK/

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks