General
-
Target
a500d48ed4e5e5dc987be8c9d2387531_JaffaCakes118
-
Size
44KB
-
Sample
240818-cqfs4sshlr
-
MD5
a500d48ed4e5e5dc987be8c9d2387531
-
SHA1
b7c64c61f8b6459898a42bc0b025d58b8e1a3a81
-
SHA256
03f9e9f645bd3c337e61106f2c0bde8f01db0be29cd3e346da1fd98803a52bac
-
SHA512
e9d3a32f1eb50490ea9a1f57798376f654393f5d75be87a31e4c7d08ea6a1e162d8d4721236825b386003b88f1494f0dab0a67271bfd050909b924b3b400e568
-
SSDEEP
768:AD++tjFqTPkAlfzth1lr6annsmTq8uvm2DfOTwYPIWzoOL:uNRUHlrr1lr6anHTZuvm2buQKoOL
Behavioral task
behavioral1
Sample
a500d48ed4e5e5dc987be8c9d2387531_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a500d48ed4e5e5dc987be8c9d2387531_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xtremerat
kahba88.zapto.org
Targets
-
-
Target
a500d48ed4e5e5dc987be8c9d2387531_JaffaCakes118
-
Size
44KB
-
MD5
a500d48ed4e5e5dc987be8c9d2387531
-
SHA1
b7c64c61f8b6459898a42bc0b025d58b8e1a3a81
-
SHA256
03f9e9f645bd3c337e61106f2c0bde8f01db0be29cd3e346da1fd98803a52bac
-
SHA512
e9d3a32f1eb50490ea9a1f57798376f654393f5d75be87a31e4c7d08ea6a1e162d8d4721236825b386003b88f1494f0dab0a67271bfd050909b924b3b400e568
-
SSDEEP
768:AD++tjFqTPkAlfzth1lr6annsmTq8uvm2DfOTwYPIWzoOL:uNRUHlrr1lr6anHTZuvm2buQKoOL
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1