General

  • Target

    JaffaCakes118_ec66039a528d408d7f9082d7515ccfd3

  • Size

    640KB

  • Sample

    250120-r7xwaavkhr

  • MD5

    ec66039a528d408d7f9082d7515ccfd3

  • SHA1

    0b3e6be03452d870c93057a0386ed6560ce986da

  • SHA256

    2d95635efe5cf1cff44e79fd4fc33cc39b98448dc60614a9f47b9dd936141110

  • SHA512

    0efff3abf29b925717f1dbfd6ebffcc9baa44b84f5531ba2868570b2134cbe3fcd088da12189bbc4a7f4bae941d777f4fe0d7a7539a83db4ac9578a22aac17e2

  • SSDEEP

    12288:77Y6+e1wOzS5hO3Sg2IQyU3zHNL4skPs60DeJq+:77MeeOzS7O3SgHQ16Ylc

Malware Config

Targets

    • Target

      JaffaCakes118_ec66039a528d408d7f9082d7515ccfd3

    • Size

      640KB

    • MD5

      ec66039a528d408d7f9082d7515ccfd3

    • SHA1

      0b3e6be03452d870c93057a0386ed6560ce986da

    • SHA256

      2d95635efe5cf1cff44e79fd4fc33cc39b98448dc60614a9f47b9dd936141110

    • SHA512

      0efff3abf29b925717f1dbfd6ebffcc9baa44b84f5531ba2868570b2134cbe3fcd088da12189bbc4a7f4bae941d777f4fe0d7a7539a83db4ac9578a22aac17e2

    • SSDEEP

      12288:77Y6+e1wOzS5hO3Sg2IQyU3zHNL4skPs60DeJq+:77MeeOzS7O3SgHQ16Ylc

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks