General

  • Target

    JaffaCakes118_87171a922b06463fbd726946d6e3138b

  • Size

    40KB

  • Sample

    250117-k2byas1jfq

  • MD5

    87171a922b06463fbd726946d6e3138b

  • SHA1

    0f992ae313d129663e9ab45f5ba4432f89537a1d

  • SHA256

    163c9b83641fe04acc8a0003cc92c6f9b3616ddba8307d99a082a97cf1cd983a

  • SHA512

    f83a42284651f3c3d1b4ba0a5907eecb1f6572c3c2c3ec69424c7c9b4f126e628b0344207159c79f6335b986a349caaad3faffb55c3ee8799aa8ad6a6257c98f

  • SSDEEP

    768:GE9hghdN12Ozhiow2Gkmd3Iq/4BzNBwIldMzoT:Gu+zMOlw2GkmmqsBld8oT

Malware Config

Targets

    • Target

      JaffaCakes118_87171a922b06463fbd726946d6e3138b

    • Size

      40KB

    • MD5

      87171a922b06463fbd726946d6e3138b

    • SHA1

      0f992ae313d129663e9ab45f5ba4432f89537a1d

    • SHA256

      163c9b83641fe04acc8a0003cc92c6f9b3616ddba8307d99a082a97cf1cd983a

    • SHA512

      f83a42284651f3c3d1b4ba0a5907eecb1f6572c3c2c3ec69424c7c9b4f126e628b0344207159c79f6335b986a349caaad3faffb55c3ee8799aa8ad6a6257c98f

    • SSDEEP

      768:GE9hghdN12Ozhiow2Gkmd3Iq/4BzNBwIldMzoT:Gu+zMOlw2GkmmqsBld8oT

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks