General

  • Target

    JaffaCakes118_1f3a5f02b9fde6aec9cbd5a411a01580

  • Size

    239KB

  • Sample

    250223-hx4reaypby

  • MD5

    1f3a5f02b9fde6aec9cbd5a411a01580

  • SHA1

    73adb92c713ad563a42e98467a549350d097584d

  • SHA256

    86242a2c978d14929033ce148a2e9d662626506228a11d4d2337725148f9e5c2

  • SHA512

    d2426d5f7d6ed8e452a8a411e017d674599b3fd72f6234ffaa24c96d8ed909f12a0c9634e546771fedc37890d259ed345def733dc4b9ebe1df3ae026f33cea8b

  • SSDEEP

    6144:0/5tDAaZsmlDUckfzFBGKKBWYBYsWZSP+Gnxe+t6:UvDAmUckDZGnxe+

Malware Config

Targets

    • Target

      JaffaCakes118_1f3a5f02b9fde6aec9cbd5a411a01580

    • Size

      239KB

    • MD5

      1f3a5f02b9fde6aec9cbd5a411a01580

    • SHA1

      73adb92c713ad563a42e98467a549350d097584d

    • SHA256

      86242a2c978d14929033ce148a2e9d662626506228a11d4d2337725148f9e5c2

    • SHA512

      d2426d5f7d6ed8e452a8a411e017d674599b3fd72f6234ffaa24c96d8ed909f12a0c9634e546771fedc37890d259ed345def733dc4b9ebe1df3ae026f33cea8b

    • SSDEEP

      6144:0/5tDAaZsmlDUckfzFBGKKBWYBYsWZSP+Gnxe+t6:UvDAmUckDZGnxe+

    • Detect XtremeRAT payload

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • Xtremerat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks