General
-
Target
aa5cc1b47c05ff2a12f9fd1e312bc7e8_JaffaCakes118
-
Size
19KB
-
Sample
240819-ktg5cayall
-
MD5
aa5cc1b47c05ff2a12f9fd1e312bc7e8
-
SHA1
0ac75d7c1db16780ea53a865f48d8d85cda88f69
-
SHA256
9da67fe3080edb611ebc54a556b3edf0c86b1c06628cc5825a5b9c6da8ba6143
-
SHA512
38eab84bb6c39ea005f3dc1b11e82e59a2d48a4c8f925b48173826a1d9327a791879a5b9800d662746fb6d3b2892032b525c5f2d00b0b5269e5434bc1b7df9d7
-
SSDEEP
384:ZHKZfuH87GowDqGoMwevqxP6k6jDwPVBSmZ4xUN4KR:8ZfuHUvwDKP6kztZTH
Behavioral task
behavioral1
Sample
aa5cc1b47c05ff2a12f9fd1e312bc7e8_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
aa5cc1b47c05ff2a12f9fd1e312bc7e8_JaffaCakes118
-
Size
19KB
-
MD5
aa5cc1b47c05ff2a12f9fd1e312bc7e8
-
SHA1
0ac75d7c1db16780ea53a865f48d8d85cda88f69
-
SHA256
9da67fe3080edb611ebc54a556b3edf0c86b1c06628cc5825a5b9c6da8ba6143
-
SHA512
38eab84bb6c39ea005f3dc1b11e82e59a2d48a4c8f925b48173826a1d9327a791879a5b9800d662746fb6d3b2892032b525c5f2d00b0b5269e5434bc1b7df9d7
-
SSDEEP
384:ZHKZfuH87GowDqGoMwevqxP6k6jDwPVBSmZ4xUN4KR:8ZfuHUvwDKP6kztZTH
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1