General

  • Target

    JaffaCakes118_bd80ee44a3c34a42b4fe8dfd74409ff3

  • Size

    769KB

  • Sample

    250208-brmglsxpbz

  • MD5

    bd80ee44a3c34a42b4fe8dfd74409ff3

  • SHA1

    7ce8e6740c89b5d96a239972f1f3f357938280af

  • SHA256

    dbb3c718e34685ca9c60855a69b84aa9f54d8179cfa5d2eae17ddb313f7709a0

  • SHA512

    538bedfb457912066f848fa75f746148403df9e1eb6ad80b5be110afe5a52a22802f6a83d8d83098293c3a950cbf2b13cac8741a79f38a461d85f966be1163d8

  • SSDEEP

    24576:5RmJkcoQricOIQxiZY1iaVYEpcWX9XOHV:WJZoQrbTFZY1iaVKWteHV

Malware Config

Targets

    • Target

      JaffaCakes118_bd80ee44a3c34a42b4fe8dfd74409ff3

    • Size

      769KB

    • MD5

      bd80ee44a3c34a42b4fe8dfd74409ff3

    • SHA1

      7ce8e6740c89b5d96a239972f1f3f357938280af

    • SHA256

      dbb3c718e34685ca9c60855a69b84aa9f54d8179cfa5d2eae17ddb313f7709a0

    • SHA512

      538bedfb457912066f848fa75f746148403df9e1eb6ad80b5be110afe5a52a22802f6a83d8d83098293c3a950cbf2b13cac8741a79f38a461d85f966be1163d8

    • SSDEEP

      24576:5RmJkcoQricOIQxiZY1iaVYEpcWX9XOHV:WJZoQrbTFZY1iaVKWteHV

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Deletes itself

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks