General

  • Target

    JaffaCakes118_8f76873cda7ac4886b27bcbaf76ac4fc

  • Size

    122KB

  • Sample

    250117-spegnatpam

  • MD5

    8f76873cda7ac4886b27bcbaf76ac4fc

  • SHA1

    133afc5af6cee55d823728a340339bb10e523403

  • SHA256

    15a882ddf52d539e53452d0d6ae5edb748bf3e146968e0062231f014beafcab4

  • SHA512

    cdc1212027a315e903fe21269dd734530cbab1c7dfb39d142d15a75255e213ac70bbb7a450f32c654a4487ba064d93d6e6db102d12fc229239ff7e7e5cb0034c

  • SSDEEP

    3072:9KAEeUJ6x5ns/kMz4cSBOPmCFckMhpBd59+eUmDk0QDF6/KTrVKa/:CeUox9s/RvXqBd59+eNQOKXUG

Malware Config

Targets

    • Target

      JaffaCakes118_8f76873cda7ac4886b27bcbaf76ac4fc

    • Size

      122KB

    • MD5

      8f76873cda7ac4886b27bcbaf76ac4fc

    • SHA1

      133afc5af6cee55d823728a340339bb10e523403

    • SHA256

      15a882ddf52d539e53452d0d6ae5edb748bf3e146968e0062231f014beafcab4

    • SHA512

      cdc1212027a315e903fe21269dd734530cbab1c7dfb39d142d15a75255e213ac70bbb7a450f32c654a4487ba064d93d6e6db102d12fc229239ff7e7e5cb0034c

    • SSDEEP

      3072:9KAEeUJ6x5ns/kMz4cSBOPmCFckMhpBd59+eUmDk0QDF6/KTrVKa/:CeUox9s/RvXqBd59+eNQOKXUG

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks