General

  • Target

    JaffaCakes118_773da871b8296896ffccb40b5c9bd6fc

  • Size

    196KB

  • Sample

    250202-a13phszjek

  • MD5

    773da871b8296896ffccb40b5c9bd6fc

  • SHA1

    0060f821272f2d8baa30a91e13dabc4bf72d3289

  • SHA256

    ba7d960521c3c9a912e49973443180266fadfc366ca3aa0b5211e0673cb976aa

  • SHA512

    7f8f2d51b0ac63b1d63110996499ddc8df0b3600033822b70e52599525c74e5bc9815de9035c1d990a9764f1a1e9e880f014ce6ae7a32e94a26cec080242e20c

  • SSDEEP

    3072:X/oqgU0ATDs5uHBRI04GIrA+adNbZzXF8v:XwqgU0AsUoPGljXRI

Malware Config

Targets

    • Target

      JaffaCakes118_773da871b8296896ffccb40b5c9bd6fc

    • Size

      196KB

    • MD5

      773da871b8296896ffccb40b5c9bd6fc

    • SHA1

      0060f821272f2d8baa30a91e13dabc4bf72d3289

    • SHA256

      ba7d960521c3c9a912e49973443180266fadfc366ca3aa0b5211e0673cb976aa

    • SHA512

      7f8f2d51b0ac63b1d63110996499ddc8df0b3600033822b70e52599525c74e5bc9815de9035c1d990a9764f1a1e9e880f014ce6ae7a32e94a26cec080242e20c

    • SSDEEP

      3072:X/oqgU0ATDs5uHBRI04GIrA+adNbZzXF8v:XwqgU0AsUoPGljXRI

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks