General

  • Target

    JaffaCakes118_08c335fad183d43581ea091d978a99b4

  • Size

    719KB

  • Sample

    250220-bkehesvmz6

  • MD5

    08c335fad183d43581ea091d978a99b4

  • SHA1

    b3dd3b452fbe812e689b0d2f0d09e98b9c50d590

  • SHA256

    6e346988e05a8bcb1204ca7e75219e7b3c3ef9efe537dec743478518c83212c2

  • SHA512

    dd843c962ba08ab4b9b5ba93833fa705b7159e8c6ddfed276abb7cad279a52786518ed4883ef5e21d9633a31a19ce359c17b6a7ebd72f2478e07b6229d378ea0

  • SSDEEP

    12288:HhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aeu054W4QdH1l:NRmJkcoQricOIQxiZY1iaeu7WN

Malware Config

Targets

    • Target

      JaffaCakes118_08c335fad183d43581ea091d978a99b4

    • Size

      719KB

    • MD5

      08c335fad183d43581ea091d978a99b4

    • SHA1

      b3dd3b452fbe812e689b0d2f0d09e98b9c50d590

    • SHA256

      6e346988e05a8bcb1204ca7e75219e7b3c3ef9efe537dec743478518c83212c2

    • SHA512

      dd843c962ba08ab4b9b5ba93833fa705b7159e8c6ddfed276abb7cad279a52786518ed4883ef5e21d9633a31a19ce359c17b6a7ebd72f2478e07b6229d378ea0

    • SSDEEP

      12288:HhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aeu054W4QdH1l:NRmJkcoQricOIQxiZY1iaeu7WN

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks