General

  • Target

    JaffaCakes118_6e83f18266276360aca11db133093aab

  • Size

    383KB

  • Sample

    250131-2j8mzs1ldp

  • MD5

    6e83f18266276360aca11db133093aab

  • SHA1

    9d09ce312df665e0971574db746a988f24d7c78b

  • SHA256

    3cc3b390f139dfbcf74bd3f86259e47e0ce3f04610c88375f56d9b2aae8479ad

  • SHA512

    b7ab08efca975a371f990c271d4beed083acb7b2ed36a8a7dc78f2b989a866c423934b1785d7a9221050c6400f7540d8fbea4265b2fdbb9249cc5df291235fc8

  • SSDEEP

    6144:ozJqe4YmVxSWhn8ShFBEtXCVFQfFt5a0hcO3rgxzOf36wLj+SX9iroOiNN97oYLw:Ab41VxRh8SjqkzY5xhtU9i8DoNf9r

Malware Config

Targets

    • Target

      JaffaCakes118_6e83f18266276360aca11db133093aab

    • Size

      383KB

    • MD5

      6e83f18266276360aca11db133093aab

    • SHA1

      9d09ce312df665e0971574db746a988f24d7c78b

    • SHA256

      3cc3b390f139dfbcf74bd3f86259e47e0ce3f04610c88375f56d9b2aae8479ad

    • SHA512

      b7ab08efca975a371f990c271d4beed083acb7b2ed36a8a7dc78f2b989a866c423934b1785d7a9221050c6400f7540d8fbea4265b2fdbb9249cc5df291235fc8

    • SSDEEP

      6144:ozJqe4YmVxSWhn8ShFBEtXCVFQfFt5a0hcO3rgxzOf36wLj+SX9iroOiNN97oYLw:Ab41VxRh8SjqkzY5xhtU9i8DoNf9r

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks