General

  • Target

    JaffaCakes118_b78ef77c25bd2ee2637782cab8765527

  • Size

    65KB

  • Sample

    250207-qvctxasnb1

  • MD5

    b78ef77c25bd2ee2637782cab8765527

  • SHA1

    9f01f99228da25a2a3a89175821495e9d69b1904

  • SHA256

    4dd54e5fd7309349b0c1b09453f9599bc4cc4887f9d43e4b826b15660a453e21

  • SHA512

    525032e27379dd29be87cd060be0ea3119f57636b5d2490173d84d19aa11a8b0605ce1d2a4afbb74a9bd67788857480555adb869715fcf62967a935933bc9c79

  • SSDEEP

    768:l9m1Sq4NQDrBsH1Uzz05De1QuMVTSN8iJHoX7Vmu6AeXVtWA4egB7voNwcSQZ:Ssq+QsJaQuISJJUmFA+F4rKNwaZ

Malware Config

Targets

    • Target

      JaffaCakes118_b78ef77c25bd2ee2637782cab8765527

    • Size

      65KB

    • MD5

      b78ef77c25bd2ee2637782cab8765527

    • SHA1

      9f01f99228da25a2a3a89175821495e9d69b1904

    • SHA256

      4dd54e5fd7309349b0c1b09453f9599bc4cc4887f9d43e4b826b15660a453e21

    • SHA512

      525032e27379dd29be87cd060be0ea3119f57636b5d2490173d84d19aa11a8b0605ce1d2a4afbb74a9bd67788857480555adb869715fcf62967a935933bc9c79

    • SSDEEP

      768:l9m1Sq4NQDrBsH1Uzz05De1QuMVTSN8iJHoX7Vmu6AeXVtWA4egB7voNwcSQZ:Ssq+QsJaQuISJJUmFA+F4rKNwaZ

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks