General

  • Target

    JaffaCakes118_268b6885fcaa8337109852805a4dab0d

  • Size

    136KB

  • Sample

    250113-k6f3tawndw

  • MD5

    268b6885fcaa8337109852805a4dab0d

  • SHA1

    72046767d67e75973a2f1b968a51125dfbfa60ed

  • SHA256

    143c46542cc836697882c45eeedf55517b974c9480bb7d7b29b11064b623bd65

  • SHA512

    b5fc3d4b9873406fc830ee7277080ca545db9313b2a34cfbc3df1c39c6b954efa310751415047623e08785794009e3283276da372008a0da8544e958bd3bc162

  • SSDEEP

    3072:Iziqv1tH5VkczyaUlaTF/RS2wyOEOBAd43RzSL:KzyLlaTa2wyOEOBAd4dG

Malware Config

Targets

    • Target

      JaffaCakes118_268b6885fcaa8337109852805a4dab0d

    • Size

      136KB

    • MD5

      268b6885fcaa8337109852805a4dab0d

    • SHA1

      72046767d67e75973a2f1b968a51125dfbfa60ed

    • SHA256

      143c46542cc836697882c45eeedf55517b974c9480bb7d7b29b11064b623bd65

    • SHA512

      b5fc3d4b9873406fc830ee7277080ca545db9313b2a34cfbc3df1c39c6b954efa310751415047623e08785794009e3283276da372008a0da8544e958bd3bc162

    • SSDEEP

      3072:Iziqv1tH5VkczyaUlaTF/RS2wyOEOBAd43RzSL:KzyLlaTa2wyOEOBAd4dG

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks