General
-
Target
92622b1a788b3a2b74faa3d2ee05f875_JaffaCakes118
-
Size
236KB
-
Sample
240813-ktp5ysygqq
-
MD5
92622b1a788b3a2b74faa3d2ee05f875
-
SHA1
353de63abe5144c234eb33e1742cb378e410383f
-
SHA256
edd12d3f9354458a9a48daa684787afe56e606c940029de5b8b92020c70e2046
-
SHA512
16418059cdeebc87c293c713562b6c8449719e7518a5c031f9cad6e4f5bc4c5b5a39d34cbcad6f88f0e05d3a6f83b8c5b046e2c86ff902367d06169cbb3c8523
-
SSDEEP
6144:viNoKZCYHHarcq7lLdt3rFyUfG6/2GTVAeigntRgLfu:viVkS6rcq7lLbrFyU5/XAeigntR8u
Static task
static1
Behavioral task
behavioral1
Sample
92622b1a788b3a2b74faa3d2ee05f875_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
xtremerat
sensualidade.zapto.org
Extracted
latentbot
sensualidade.zapto.org
Targets
-
-
Target
92622b1a788b3a2b74faa3d2ee05f875_JaffaCakes118
-
Size
236KB
-
MD5
92622b1a788b3a2b74faa3d2ee05f875
-
SHA1
353de63abe5144c234eb33e1742cb378e410383f
-
SHA256
edd12d3f9354458a9a48daa684787afe56e606c940029de5b8b92020c70e2046
-
SHA512
16418059cdeebc87c293c713562b6c8449719e7518a5c031f9cad6e4f5bc4c5b5a39d34cbcad6f88f0e05d3a6f83b8c5b046e2c86ff902367d06169cbb3c8523
-
SSDEEP
6144:viNoKZCYHHarcq7lLdt3rFyUfG6/2GTVAeigntRgLfu:viVkS6rcq7lLbrFyU5/XAeigntR8u
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1