General

  • Target

    JaffaCakes118_7b9be6fcc57f7507cdd89351c182af43

  • Size

    301KB

  • Sample

    250104-y9x3dswkhv

  • MD5

    7b9be6fcc57f7507cdd89351c182af43

  • SHA1

    ea59e983e9b5f228427adcee06b16d9ef050b166

  • SHA256

    027d833faa373104adf14164f833db572e006fd688c1799041da848f76acfdbf

  • SHA512

    a5364aad9867ba9812be947c2f4a377c3e8ba83f23598ebdaa017f0248c307bb0ecffd2b625b64cf826ab14edf29f4232979007834a45d6e0525c8a33b32805c

  • SSDEEP

    6144:2dC2F8NXC796TB9vj48yCjlpTUh5MRH16D:2XeVQkTrvj4vCjLIv4HE

Malware Config

Targets

    • Target

      JaffaCakes118_7b9be6fcc57f7507cdd89351c182af43

    • Size

      301KB

    • MD5

      7b9be6fcc57f7507cdd89351c182af43

    • SHA1

      ea59e983e9b5f228427adcee06b16d9ef050b166

    • SHA256

      027d833faa373104adf14164f833db572e006fd688c1799041da848f76acfdbf

    • SHA512

      a5364aad9867ba9812be947c2f4a377c3e8ba83f23598ebdaa017f0248c307bb0ecffd2b625b64cf826ab14edf29f4232979007834a45d6e0525c8a33b32805c

    • SSDEEP

      6144:2dC2F8NXC796TB9vj48yCjlpTUh5MRH16D:2XeVQkTrvj4vCjLIv4HE

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks