General

  • Target

    JaffaCakes118_0c47fb7fd347405b55d70e63b0e30a3b

  • Size

    107KB

  • Sample

    250220-rjsxesyj14

  • MD5

    0c47fb7fd347405b55d70e63b0e30a3b

  • SHA1

    4acf8903ff82f35509be14e5530bffea3fd1957d

  • SHA256

    b76a807606db6a1aac5682e7d41029d4c37cadf66450ac3921d3f52185b786aa

  • SHA512

    ed481e19d59a5417408d542f08a38f3ce734b51ff18248470817e919faa1b4d9252e4871a00112ab70874f813da03ceca6c925b2e4603630de698e8d863cac03

  • SSDEEP

    3072:1sB1D0vmB7U+OxyN+RcAx05aX74BsPNuMqLIe+:yB1wv4oRxbR905aXgssMre+

Malware Config

Targets

    • Target

      JaffaCakes118_0c47fb7fd347405b55d70e63b0e30a3b

    • Size

      107KB

    • MD5

      0c47fb7fd347405b55d70e63b0e30a3b

    • SHA1

      4acf8903ff82f35509be14e5530bffea3fd1957d

    • SHA256

      b76a807606db6a1aac5682e7d41029d4c37cadf66450ac3921d3f52185b786aa

    • SHA512

      ed481e19d59a5417408d542f08a38f3ce734b51ff18248470817e919faa1b4d9252e4871a00112ab70874f813da03ceca6c925b2e4603630de698e8d863cac03

    • SSDEEP

      3072:1sB1D0vmB7U+OxyN+RcAx05aX74BsPNuMqLIe+:yB1wv4oRxbR905aXgssMre+

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks