General

  • Target

    JaffaCakes118_5d5a39786f9e55059c403390cb50084e

  • Size

    128KB

  • Sample

    250130-b1daastnam

  • MD5

    5d5a39786f9e55059c403390cb50084e

  • SHA1

    197c292179bbe597ade6e9cd7ad87212ccb02e46

  • SHA256

    a35e6c849ee387bab6fd380f66b882af8d6b0c692c54a5bed1133587a849fb1d

  • SHA512

    b2802eb873975576183f6a4d017405426482307d22caa5ac10e7289cce3cf12a32acac1348c2a5ab5bf4f9d11d42d6ad2478adcbb28679130d74517e30638a3c

  • SSDEEP

    3072:4np8LCcYokY7hycwKGEnPfS+TpSH4peV25MV:Qp8LCcwQXja+T0Hxm

Malware Config

Targets

    • Target

      JaffaCakes118_5d5a39786f9e55059c403390cb50084e

    • Size

      128KB

    • MD5

      5d5a39786f9e55059c403390cb50084e

    • SHA1

      197c292179bbe597ade6e9cd7ad87212ccb02e46

    • SHA256

      a35e6c849ee387bab6fd380f66b882af8d6b0c692c54a5bed1133587a849fb1d

    • SHA512

      b2802eb873975576183f6a4d017405426482307d22caa5ac10e7289cce3cf12a32acac1348c2a5ab5bf4f9d11d42d6ad2478adcbb28679130d74517e30638a3c

    • SSDEEP

      3072:4np8LCcYokY7hycwKGEnPfS+TpSH4peV25MV:Qp8LCcwQXja+T0Hxm

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks