General

  • Target

    JaffaCakes118_f47c9b8d2c51230830d4575ad4647237

  • Size

    971KB

  • Sample

    250214-g12wjswjat

  • MD5

    f47c9b8d2c51230830d4575ad4647237

  • SHA1

    99b6ce244240ed1996b9e63d072f9379350ba049

  • SHA256

    c3b72e467295324862f281885750d3d860c7a6b2bd2af9b1117632750e39b071

  • SHA512

    cf88181f05f7d20b6e480c23e47b20df8b4c4ac733aa3c62c46a73cc734bdf7258b43d175d1cd13302aadf4d9a72988fa6bb1d06d279445ddacc770dac3a4370

  • SSDEEP

    12288:eaWzgMg7v3qnCiMErQohh0F4CCJ8lny/QCIgKKM4YV/Z2Sr:paHMv6Corjqny/QBR1V/Z2u

Malware Config

Targets

    • Target

      JaffaCakes118_f47c9b8d2c51230830d4575ad4647237

    • Size

      971KB

    • MD5

      f47c9b8d2c51230830d4575ad4647237

    • SHA1

      99b6ce244240ed1996b9e63d072f9379350ba049

    • SHA256

      c3b72e467295324862f281885750d3d860c7a6b2bd2af9b1117632750e39b071

    • SHA512

      cf88181f05f7d20b6e480c23e47b20df8b4c4ac733aa3c62c46a73cc734bdf7258b43d175d1cd13302aadf4d9a72988fa6bb1d06d279445ddacc770dac3a4370

    • SSDEEP

      12288:eaWzgMg7v3qnCiMErQohh0F4CCJ8lny/QCIgKKM4YV/Z2Sr:paHMv6Corjqny/QBR1V/Z2u

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks