General

  • Target

    JaffaCakes118_3d6280da3af4421e4aa08f14486cde73

  • Size

    141KB

  • Sample

    250127-jk3t1szjcr

  • MD5

    3d6280da3af4421e4aa08f14486cde73

  • SHA1

    e5b3f3c1e7875956070bd6978dddb6e9190a013f

  • SHA256

    1060162072392c39d3d7ae4ad30fd2f391d0d40961708e935d599662066942f7

  • SHA512

    0e2034931502c3b8e78e60e8705cb59139c952db61a9c8b037352de8d2951a3f0c4dcb4d441137459f8ab0021113e25602b4154b00896a2a13e38f1b9e72c460

  • SSDEEP

    3072:RmVZ3bRZW2+dzaw0sMJttlUyFlI+e+5pOdKqWUuRj:aRDWB5A80I+YvfuRj

Malware Config

Targets

    • Target

      JaffaCakes118_3d6280da3af4421e4aa08f14486cde73

    • Size

      141KB

    • MD5

      3d6280da3af4421e4aa08f14486cde73

    • SHA1

      e5b3f3c1e7875956070bd6978dddb6e9190a013f

    • SHA256

      1060162072392c39d3d7ae4ad30fd2f391d0d40961708e935d599662066942f7

    • SHA512

      0e2034931502c3b8e78e60e8705cb59139c952db61a9c8b037352de8d2951a3f0c4dcb4d441137459f8ab0021113e25602b4154b00896a2a13e38f1b9e72c460

    • SSDEEP

      3072:RmVZ3bRZW2+dzaw0sMJttlUyFlI+e+5pOdKqWUuRj:aRDWB5A80I+YvfuRj

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks