Resubmissions

12-01-2025 15:48

250112-s8223aykfx 10

12-01-2025 15:35

250112-s1cgfaxqhx 10

General

  • Target

    JaffaCakes118_1227b76e0d09be1a3189f997f0096e3d

  • Size

    171KB

  • Sample

    250112-s1cgfaxqhx

  • MD5

    1227b76e0d09be1a3189f997f0096e3d

  • SHA1

    d1fa42ace2868175e1d7f8d026caab4e8c09bfb1

  • SHA256

    a056f867a236bbaff94e7da81355ac0725aefb5a41376f42ce06eb938af6211b

  • SHA512

    08ad3059abf619b7175c65644b8adc5c1ce00a4800b703b9d9bbe52032d3a756c1abe9f35f1c533c820c9ab61a41962b6128b9edcdd0d9dd2e424dea10357b19

  • SSDEEP

    3072:lxexkMNY+4n8iVMMS73Gso2APwDsvZMQ0rX8Zv:D6k/+4nNv9vIDZf41

Malware Config

Targets

    • Target

      JaffaCakes118_1227b76e0d09be1a3189f997f0096e3d

    • Size

      171KB

    • MD5

      1227b76e0d09be1a3189f997f0096e3d

    • SHA1

      d1fa42ace2868175e1d7f8d026caab4e8c09bfb1

    • SHA256

      a056f867a236bbaff94e7da81355ac0725aefb5a41376f42ce06eb938af6211b

    • SHA512

      08ad3059abf619b7175c65644b8adc5c1ce00a4800b703b9d9bbe52032d3a756c1abe9f35f1c533c820c9ab61a41962b6128b9edcdd0d9dd2e424dea10357b19

    • SSDEEP

      3072:lxexkMNY+4n8iVMMS73Gso2APwDsvZMQ0rX8Zv:D6k/+4nNv9vIDZf41

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks