General

  • Target

    JaffaCakes118_c200a046fd4b5e858f71173bc992c400

  • Size

    372KB

  • Sample

    250208-mcvefsyqdz

  • MD5

    c200a046fd4b5e858f71173bc992c400

  • SHA1

    d9c019b9ea5fe8d25f696d759bcbae1ab57b28d7

  • SHA256

    e3a9e90308d7a12bd83ad8d85b746500db04887adc6d1cab0223592ca7a53503

  • SHA512

    63c75179ebe46635a9753695375ebd53d4c84faaa11d6e8bc23af60554ccec4e2d9673d761f313990b73989056dc9b95aca30160c4faa3925c6ce8c6cd0ad381

  • SSDEEP

    6144:rPwurnUZkJGPJxkOCW/CW68QD1Qeme0039q2tIA2ueDf:AxxkVGej91ejDf

Malware Config

Targets

    • Target

      JaffaCakes118_c200a046fd4b5e858f71173bc992c400

    • Size

      372KB

    • MD5

      c200a046fd4b5e858f71173bc992c400

    • SHA1

      d9c019b9ea5fe8d25f696d759bcbae1ab57b28d7

    • SHA256

      e3a9e90308d7a12bd83ad8d85b746500db04887adc6d1cab0223592ca7a53503

    • SHA512

      63c75179ebe46635a9753695375ebd53d4c84faaa11d6e8bc23af60554ccec4e2d9673d761f313990b73989056dc9b95aca30160c4faa3925c6ce8c6cd0ad381

    • SSDEEP

      6144:rPwurnUZkJGPJxkOCW/CW68QD1Qeme0039q2tIA2ueDf:AxxkVGej91ejDf

    • Detect XtremeRAT payload

    • Modifies firewall policy service

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks