General
-
Target
00f8af51c599a1c587db96baa968e306_JaffaCakes118
-
Size
479KB
-
Sample
240619-2q7z2azcrj
-
MD5
00f8af51c599a1c587db96baa968e306
-
SHA1
85cf2d60a0e9254792e2122b0fffb563ae36ccbb
-
SHA256
4820c9a787707d31ed70c14fb1b99adf71d1de5f8f9f562f8292289fc2e9f1e7
-
SHA512
846f42baea812e412021e47a94963edd05feabe2e6d3e0ee62cbcdd4c9af66659068e1c0027b0dd000d3902e928b92dc16c78fc972f8de3da3cfa8242fd59357
-
SSDEEP
12288:RJVVod+G5B3K4FAtuHF//6oExJ7f+qy+38u:Ryf5B35FA6F36oExpGEsu
Static task
static1
Behavioral task
behavioral1
Sample
00f8af51c599a1c587db96baa968e306_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00f8af51c599a1c587db96baa968e306_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
00f8af51c599a1c587db96baa968e306_JaffaCakes118
-
Size
479KB
-
MD5
00f8af51c599a1c587db96baa968e306
-
SHA1
85cf2d60a0e9254792e2122b0fffb563ae36ccbb
-
SHA256
4820c9a787707d31ed70c14fb1b99adf71d1de5f8f9f562f8292289fc2e9f1e7
-
SHA512
846f42baea812e412021e47a94963edd05feabe2e6d3e0ee62cbcdd4c9af66659068e1c0027b0dd000d3902e928b92dc16c78fc972f8de3da3cfa8242fd59357
-
SSDEEP
12288:RJVVod+G5B3K4FAtuHF//6oExJ7f+qy+38u:Ryf5B35FA6F36oExpGEsu
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-