General

  • Target

    JaffaCakes118_ad9e69ee45fb46c40a939c2886b056a3

  • Size

    80KB

  • Sample

    250206-vs627asrdr

  • MD5

    ad9e69ee45fb46c40a939c2886b056a3

  • SHA1

    72b0f981ecfe513724ae90f8088bf54a74625fd0

  • SHA256

    23ccac4f6fff369bfaf2b5d8084b215325eba2eb6a9241a3c409d0c5ecba96fa

  • SHA512

    b0604bef7115f9bbf8c92dcfa4a67862574a4e6d285bb6143699479136b730e9342eeddcc8668c5d8ef98a840cdd6f5b9877098b89d80716dd363b5b3a03ab96

  • SSDEEP

    768:wBr+tjFqTtTlJztWsvp8W3h/OXw1Z1jvzoIqmEeU2FhBx:gyRUhlRZvp8W3PrjLoIqD6hB

Malware Config

Targets

    • Target

      JaffaCakes118_ad9e69ee45fb46c40a939c2886b056a3

    • Size

      80KB

    • MD5

      ad9e69ee45fb46c40a939c2886b056a3

    • SHA1

      72b0f981ecfe513724ae90f8088bf54a74625fd0

    • SHA256

      23ccac4f6fff369bfaf2b5d8084b215325eba2eb6a9241a3c409d0c5ecba96fa

    • SHA512

      b0604bef7115f9bbf8c92dcfa4a67862574a4e6d285bb6143699479136b730e9342eeddcc8668c5d8ef98a840cdd6f5b9877098b89d80716dd363b5b3a03ab96

    • SSDEEP

      768:wBr+tjFqTtTlJztWsvp8W3h/OXw1Z1jvzoIqmEeU2FhBx:gyRUhlRZvp8W3PrjLoIqD6hB

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks