General

  • Target

    JaffaCakes118_3013d51e1479f16ac04febf86fc1f14d

  • Size

    164KB

  • Sample

    250125-14yg3stmgp

  • MD5

    3013d51e1479f16ac04febf86fc1f14d

  • SHA1

    acb304bf8bca7d3f3a6eea8cfa3c82439784ef71

  • SHA256

    802458bb6c45cb66b73f882d754acfd1e4e30e07521bfe0d0a2e3dbd6b2599c9

  • SHA512

    fa9c35c94389d63fe8b1d4403f3deef62c74b29d48081bbe86967fdb8f8fdc5a240be5766926e4dc03dc6a6c89529cccc67e1b444cd58384c5d862fd123be3a6

  • SSDEEP

    3072:cdc5jZdYTlSiWQe0TJb6fmVTKJz+s3fv:hOXTuz+sX

Malware Config

Targets

    • Target

      JaffaCakes118_3013d51e1479f16ac04febf86fc1f14d

    • Size

      164KB

    • MD5

      3013d51e1479f16ac04febf86fc1f14d

    • SHA1

      acb304bf8bca7d3f3a6eea8cfa3c82439784ef71

    • SHA256

      802458bb6c45cb66b73f882d754acfd1e4e30e07521bfe0d0a2e3dbd6b2599c9

    • SHA512

      fa9c35c94389d63fe8b1d4403f3deef62c74b29d48081bbe86967fdb8f8fdc5a240be5766926e4dc03dc6a6c89529cccc67e1b444cd58384c5d862fd123be3a6

    • SSDEEP

      3072:cdc5jZdYTlSiWQe0TJb6fmVTKJz+s3fv:hOXTuz+sX

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks