General
-
Target
8ed96363807d7af23480b717aab882d8_JaffaCakes118
-
Size
21KB
-
Sample
240812-qeenkawfna
-
MD5
8ed96363807d7af23480b717aab882d8
-
SHA1
653afcaa1564827599b130c894fefd1574cc3a23
-
SHA256
2498bf61d13c123eb4d043c2a07674881b524a59664dd41228ec5b8cbd306eb6
-
SHA512
f875def334ff17a95cfb751acba5fc7d0399ae5c97f351e8bb2084332ebb302aa07bdd7ab954dec172e7afb214e72e1cd869d29cda7652f0f531c0c6ea4fafc8
-
SSDEEP
384:HIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlKpIQjLbdgjjpLR:HIsF81fG9QveLOYTe5Yi8pIgXSH
Behavioral task
behavioral1
Sample
8ed96363807d7af23480b717aab882d8_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
xtremerat
damla.no-ip.biz
Targets
-
-
Target
8ed96363807d7af23480b717aab882d8_JaffaCakes118
-
Size
21KB
-
MD5
8ed96363807d7af23480b717aab882d8
-
SHA1
653afcaa1564827599b130c894fefd1574cc3a23
-
SHA256
2498bf61d13c123eb4d043c2a07674881b524a59664dd41228ec5b8cbd306eb6
-
SHA512
f875def334ff17a95cfb751acba5fc7d0399ae5c97f351e8bb2084332ebb302aa07bdd7ab954dec172e7afb214e72e1cd869d29cda7652f0f531c0c6ea4fafc8
-
SSDEEP
384:HIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlKpIQjLbdgjjpLR:HIsF81fG9QveLOYTe5Yi8pIgXSH
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1