General

  • Target

    JaffaCakes118_a735bd294e28c959a7b132c1b7dd4cb7

  • Size

    770KB

  • Sample

    250206-exycvavlfp

  • MD5

    a735bd294e28c959a7b132c1b7dd4cb7

  • SHA1

    78edfc6d3dfcba7abbb40884e8be8c4271fd1871

  • SHA256

    37c647356433b55653707bf8d42dd85b2c1e88232e379d6e0e122f56ff373692

  • SHA512

    032b9ddd0de9a4e1d0de1e25c32bf4d4da1f607580ed99a70ef2a587ba5dd59029f94c3ebed69b9d942c4495b674237d3bce8f6eae46648d9d189fc652aa2b1e

  • SSDEEP

    12288:L2Ar2l4yVYgwj5qUBFLlBJFQCLWlDIgZt64BM+z1VOYYIzpL7Qo72SSa:LPjyVYggNll9dGbZt64BVV/jpL7QY2

Malware Config

Targets

    • Target

      JaffaCakes118_a735bd294e28c959a7b132c1b7dd4cb7

    • Size

      770KB

    • MD5

      a735bd294e28c959a7b132c1b7dd4cb7

    • SHA1

      78edfc6d3dfcba7abbb40884e8be8c4271fd1871

    • SHA256

      37c647356433b55653707bf8d42dd85b2c1e88232e379d6e0e122f56ff373692

    • SHA512

      032b9ddd0de9a4e1d0de1e25c32bf4d4da1f607580ed99a70ef2a587ba5dd59029f94c3ebed69b9d942c4495b674237d3bce8f6eae46648d9d189fc652aa2b1e

    • SSDEEP

      12288:L2Ar2l4yVYgwj5qUBFLlBJFQCLWlDIgZt64BM+z1VOYYIzpL7Qo72SSa:LPjyVYggNll9dGbZt64BVV/jpL7QY2

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks