General

  • Target

    JaffaCakes118_52d6445271700467d4c2a8cbef92088e

  • Size

    157KB

  • Sample

    250129-fc53ma1mhy

  • MD5

    52d6445271700467d4c2a8cbef92088e

  • SHA1

    1271de90f53693462d47fccb1292d85d1255c35d

  • SHA256

    8407faeeafcbe2db98998240623efe895cb59d3cc7c5e730e1ed44899e1dd346

  • SHA512

    17cef756fa078b88de22ca95feaed253f54becd755d883648be1aef52ec55c9cba3a603f0f816bea9608a0fb0cd8857c90cef100850f5e9c9160cdfc7fa21e7f

  • SSDEEP

    3072:jagY+O7ioNwoh/4XZHgv+viAqYMgvPT70xhBs+9fvjtx:GgmQZHgv+v9370xXHZx

Malware Config

Targets

    • Target

      JaffaCakes118_52d6445271700467d4c2a8cbef92088e

    • Size

      157KB

    • MD5

      52d6445271700467d4c2a8cbef92088e

    • SHA1

      1271de90f53693462d47fccb1292d85d1255c35d

    • SHA256

      8407faeeafcbe2db98998240623efe895cb59d3cc7c5e730e1ed44899e1dd346

    • SHA512

      17cef756fa078b88de22ca95feaed253f54becd755d883648be1aef52ec55c9cba3a603f0f816bea9608a0fb0cd8857c90cef100850f5e9c9160cdfc7fa21e7f

    • SSDEEP

      3072:jagY+O7ioNwoh/4XZHgv+viAqYMgvPT70xhBs+9fvjtx:GgmQZHgv+v9370xXHZx

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks