General

  • Target

    JaffaCakes118_1b549d71c67770be47960330a2b988e1

  • Size

    444KB

  • Sample

    250112-3te9vsvpct

  • MD5

    1b549d71c67770be47960330a2b988e1

  • SHA1

    b4582a06075c1a851bab798a68408f74b9cd2b7d

  • SHA256

    188128fbd865fbab08295e257d5372ddc7420317f45ac8c70d4e439282bc6055

  • SHA512

    2cef38bbe01cae39e3da2da02984199d6e217d98f5ff76f3c349042dc10e8094ccc79f129ce1b5828bda36426cea7910a26a56a404af74b9e3f535ec9f4b90ad

  • SSDEEP

    12288:vpz2MNX2tGY62Nx+bj5JVnC03ZMuqH3abLrKIkq:Y+XDl2NSjnVnjKusknKIkq

Malware Config

Targets

    • Target

      JaffaCakes118_1b549d71c67770be47960330a2b988e1

    • Size

      444KB

    • MD5

      1b549d71c67770be47960330a2b988e1

    • SHA1

      b4582a06075c1a851bab798a68408f74b9cd2b7d

    • SHA256

      188128fbd865fbab08295e257d5372ddc7420317f45ac8c70d4e439282bc6055

    • SHA512

      2cef38bbe01cae39e3da2da02984199d6e217d98f5ff76f3c349042dc10e8094ccc79f129ce1b5828bda36426cea7910a26a56a404af74b9e3f535ec9f4b90ad

    • SSDEEP

      12288:vpz2MNX2tGY62Nx+bj5JVnC03ZMuqH3abLrKIkq:Y+XDl2NSjnVnjKusknKIkq

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks