General

  • Target

    JaffaCakes118_346c6012a915bd9991f5bd367b5ddaed

  • Size

    192KB

  • Sample

    250126-lqafrszkbm

  • MD5

    346c6012a915bd9991f5bd367b5ddaed

  • SHA1

    5fede2bbaf4fffcaf6113c62cb7cb1d830b7926b

  • SHA256

    07e1821f25247fe00077540c9ea9ddead92e91c40bc58be5c9962c38107802e8

  • SHA512

    03e53c1c589e1e041beb72dcfd69bfa10c6b4d447311edd96ade63028b60136f4d9f739f84a9e93c6cd5f348bea08bf740bd81d80fb7e09708a4360ba41c3c49

  • SSDEEP

    3072:qezNcARiXE1d+1mfA69pOevJtNx1FMPKGzaWrskkkPKF8/Gcv:q248pOextNx1

Malware Config

Targets

    • Target

      JaffaCakes118_346c6012a915bd9991f5bd367b5ddaed

    • Size

      192KB

    • MD5

      346c6012a915bd9991f5bd367b5ddaed

    • SHA1

      5fede2bbaf4fffcaf6113c62cb7cb1d830b7926b

    • SHA256

      07e1821f25247fe00077540c9ea9ddead92e91c40bc58be5c9962c38107802e8

    • SHA512

      03e53c1c589e1e041beb72dcfd69bfa10c6b4d447311edd96ade63028b60136f4d9f739f84a9e93c6cd5f348bea08bf740bd81d80fb7e09708a4360ba41c3c49

    • SSDEEP

      3072:qezNcARiXE1d+1mfA69pOevJtNx1FMPKGzaWrskkkPKF8/Gcv:q248pOextNx1

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks