General
-
Target
75585ac15fa79ad0bf4f41e27691df2a_JaffaCakes118
-
Size
1.2MB
-
Sample
240726-xv59sasbpe
-
MD5
75585ac15fa79ad0bf4f41e27691df2a
-
SHA1
de82e70f4b35990af5a5c3435604392f882c4c98
-
SHA256
dc13250e8bf5da619a3136d73b72ac57c395c3cca9db14f78b1b11a061f0ac3c
-
SHA512
a7156bf9505774be25bca2d1c0bdf86cf9480800e8607fba1830d8144b7061e3eb43e11a7ec898cd1d8c321f2df36d9463a47df80c4c6e6f78682877ea420c0e
-
SSDEEP
24576:7GrQyhEEjp+RHYu8gwtAjdXGV3jIkUAfRH:pnYVgbXw3pUAp
Static task
static1
Behavioral task
behavioral1
Sample
75585ac15fa79ad0bf4f41e27691df2a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
75585ac15fa79ad0bf4f41e27691df2a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
75585ac15fa79ad0bf4f41e27691df2a_JaffaCakes118
-
Size
1.2MB
-
MD5
75585ac15fa79ad0bf4f41e27691df2a
-
SHA1
de82e70f4b35990af5a5c3435604392f882c4c98
-
SHA256
dc13250e8bf5da619a3136d73b72ac57c395c3cca9db14f78b1b11a061f0ac3c
-
SHA512
a7156bf9505774be25bca2d1c0bdf86cf9480800e8607fba1830d8144b7061e3eb43e11a7ec898cd1d8c321f2df36d9463a47df80c4c6e6f78682877ea420c0e
-
SSDEEP
24576:7GrQyhEEjp+RHYu8gwtAjdXGV3jIkUAfRH:pnYVgbXw3pUAp
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1