General
-
Target
6abe27f5fb28b360152fb6dc7f521d64_JaffaCakes118
-
Size
4.3MB
-
Sample
240523-m88lysea4v
-
MD5
6abe27f5fb28b360152fb6dc7f521d64
-
SHA1
c29253502e7799a4468c569ea907cfa4d2852b62
-
SHA256
4331fd03d4281b82c3be8dcee3d53559ecb824e1bfdf4d86475c795ac209f0d0
-
SHA512
7b505b00b38b6dc088a771946f1a1f4b4d732503ba45b4c085e0f84a179ceb3225019480b51289d37bc4612b01e317167660bf5ca5f139edae45a0f215e75b32
-
SSDEEP
49152:IF0Mm2cTlxddiX12EOC3OTe44A8xXiHFjCuf0J1d7H8BummLm/fj8/zkGT/dZ91F:IFBmc
Static task
static1
Behavioral task
behavioral1
Sample
6abe27f5fb28b360152fb6dc7f521d64_JaffaCakes118.exe
Resource
win7-20240419-en
Malware Config
Extracted
xtremerat
mongtrelgo.hopto.org
Extracted
lokibot
http://hydeoutent.com/app/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
6abe27f5fb28b360152fb6dc7f521d64_JaffaCakes118
-
Size
4.3MB
-
MD5
6abe27f5fb28b360152fb6dc7f521d64
-
SHA1
c29253502e7799a4468c569ea907cfa4d2852b62
-
SHA256
4331fd03d4281b82c3be8dcee3d53559ecb824e1bfdf4d86475c795ac209f0d0
-
SHA512
7b505b00b38b6dc088a771946f1a1f4b4d732503ba45b4c085e0f84a179ceb3225019480b51289d37bc4612b01e317167660bf5ca5f139edae45a0f215e75b32
-
SSDEEP
49152:IF0Mm2cTlxddiX12EOC3OTe44A8xXiHFjCuf0J1d7H8BummLm/fj8/zkGT/dZ91F:IFBmc
-
Class file contains resources related to AdWind
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Modifies Installed Components in the registry
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3