General

  • Target

    JaffaCakes118_cac6074be5cb2193444867041334a08c

  • Size

    862KB

  • Sample

    250209-d837sstqez

  • MD5

    cac6074be5cb2193444867041334a08c

  • SHA1

    52b6f805321f04f7cb3a886c0471ac3bc5a6f691

  • SHA256

    5c2df664fe4e89717ed46e5401ed42928e1955bbd90ea03fc47a1d6727fbe12d

  • SHA512

    2fb0e85b7436182bbc7daf78e7c59a64df9e0074ed9c5bd9fe3f8f311257f1f46ef88aa4a9f501e2e4cf2b6e76541619477acb99276d985be6d18877048dd281

  • SSDEEP

    24576:Cpo/2+ttPJLfpRK3CdfD0QZh9ufEdt2jc:De2PJLa3CdMfiQjc

Malware Config

Targets

    • Target

      JaffaCakes118_cac6074be5cb2193444867041334a08c

    • Size

      862KB

    • MD5

      cac6074be5cb2193444867041334a08c

    • SHA1

      52b6f805321f04f7cb3a886c0471ac3bc5a6f691

    • SHA256

      5c2df664fe4e89717ed46e5401ed42928e1955bbd90ea03fc47a1d6727fbe12d

    • SHA512

      2fb0e85b7436182bbc7daf78e7c59a64df9e0074ed9c5bd9fe3f8f311257f1f46ef88aa4a9f501e2e4cf2b6e76541619477acb99276d985be6d18877048dd281

    • SSDEEP

      24576:Cpo/2+ttPJLfpRK3CdfD0QZh9ufEdt2jc:De2PJLa3CdMfiQjc

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Downloads MZ/PE file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks