General

  • Target

    JaffaCakes118_64f5d336a62fd66a7ba87d7566cf0a29

  • Size

    324KB

  • Sample

    250130-vvxljaxngw

  • MD5

    64f5d336a62fd66a7ba87d7566cf0a29

  • SHA1

    1181ff3f0588f4e9beb74efa53313d9d0c2d5590

  • SHA256

    08ae46405298caab5f5fd99636a9c9af19e973990098c38fbf5ee2ca58acf8dd

  • SHA512

    3962de4a96b2264235f5d89084f083618e7824011320e26dc28622f728296ab6720a0fe8c060136fdbe3a4dc6e0d86ca415e2cd8fad5b27eee44161ec732afaf

  • SSDEEP

    6144:usYZeupvMqgRShfnGpjeSKueGq8wpGlzPM9RRQFMtksDIncOtUOiuNofHLHKR:weupFgcOpNHealzPMRRNksotC2ofrKR

Malware Config

Targets

    • Target

      JaffaCakes118_64f5d336a62fd66a7ba87d7566cf0a29

    • Size

      324KB

    • MD5

      64f5d336a62fd66a7ba87d7566cf0a29

    • SHA1

      1181ff3f0588f4e9beb74efa53313d9d0c2d5590

    • SHA256

      08ae46405298caab5f5fd99636a9c9af19e973990098c38fbf5ee2ca58acf8dd

    • SHA512

      3962de4a96b2264235f5d89084f083618e7824011320e26dc28622f728296ab6720a0fe8c060136fdbe3a4dc6e0d86ca415e2cd8fad5b27eee44161ec732afaf

    • SSDEEP

      6144:usYZeupvMqgRShfnGpjeSKueGq8wpGlzPM9RRQFMtksDIncOtUOiuNofHLHKR:weupFgcOpNHealzPMRRNksotC2ofrKR

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks