General

  • Target

    JaffaCakes118_2a5160fb860de2b574676182e6eaf893

  • Size

    639KB

  • Sample

    250125-lkczpsylbj

  • MD5

    2a5160fb860de2b574676182e6eaf893

  • SHA1

    f032aabda2bb47f1d88c13fbb2b07fea3d4b19ae

  • SHA256

    9e9f9e85419732188c1f43f14db9fbd5eecfdead782b8f1582369c17f673cc69

  • SHA512

    8126d542da4ef24130fec88f691389a1823c4795c8317560d2922127561f8d71526d3857a64627ce61d6c5032b834f46d1e52c97374df1a211d805ee47cf15fa

  • SSDEEP

    12288:JWo7YNQ42YcKify3iAjPIP5d0QjUFfRJhee+Y2fc6:9wQjsiK3jjPIPfadg3YD6

Malware Config

Targets

    • Target

      JaffaCakes118_2a5160fb860de2b574676182e6eaf893

    • Size

      639KB

    • MD5

      2a5160fb860de2b574676182e6eaf893

    • SHA1

      f032aabda2bb47f1d88c13fbb2b07fea3d4b19ae

    • SHA256

      9e9f9e85419732188c1f43f14db9fbd5eecfdead782b8f1582369c17f673cc69

    • SHA512

      8126d542da4ef24130fec88f691389a1823c4795c8317560d2922127561f8d71526d3857a64627ce61d6c5032b834f46d1e52c97374df1a211d805ee47cf15fa

    • SSDEEP

      12288:JWo7YNQ42YcKify3iAjPIP5d0QjUFfRJhee+Y2fc6:9wQjsiK3jjPIPfadg3YD6

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks