General

  • Target

    JaffaCakes118_907b85ab796fd103ca610f91714e4bad

  • Size

    701KB

  • Sample

    250204-ge8rzaypaj

  • MD5

    907b85ab796fd103ca610f91714e4bad

  • SHA1

    3c8e9171f6a14008e141737ddb7120df85c96a6b

  • SHA256

    3acdef6b773fcae4790f0f31470f95f15be01b0ee7553c706ca12bb75fc337c1

  • SHA512

    ea40248dbc67516cdc8dbb0670879650a8a3afc123525abce1b2aa900687f937110e195ebec7021b8cf7915f153914427f0596cc13921c4183334d34e6875283

  • SSDEEP

    12288:chkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aaGFMzw:URmJkcoQricOIQxiZY1iaaGFME

Malware Config

Targets

    • Target

      JaffaCakes118_907b85ab796fd103ca610f91714e4bad

    • Size

      701KB

    • MD5

      907b85ab796fd103ca610f91714e4bad

    • SHA1

      3c8e9171f6a14008e141737ddb7120df85c96a6b

    • SHA256

      3acdef6b773fcae4790f0f31470f95f15be01b0ee7553c706ca12bb75fc337c1

    • SHA512

      ea40248dbc67516cdc8dbb0670879650a8a3afc123525abce1b2aa900687f937110e195ebec7021b8cf7915f153914427f0596cc13921c4183334d34e6875283

    • SSDEEP

      12288:chkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aaGFMzw:URmJkcoQricOIQxiZY1iaaGFME

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks