General
-
Target
ad3ecf52e68a2185b53304bb858bb609_JaffaCakes118
-
Size
596KB
-
Sample
240820-a2y3qayekl
-
MD5
ad3ecf52e68a2185b53304bb858bb609
-
SHA1
6d56e98364b99987d296cf90ab2ab0ce1448bbef
-
SHA256
3d18aadb4d297bd0173fb050a1907c3a1f6ea93142264fab50790454474afa34
-
SHA512
33f7278f6b50212d05e235dd0803c6c54d322f11298d32c1d5e5a96e76deeed80d38eeef4b098d911643c38ead28ca806a55d4a9428450dedaa0407a3aed10c8
-
SSDEEP
3072:YfluM7g422i4SzgHkdXEgw8bPba3xv68ERMHtbirXDtAvd46XFTmK11NfN:Yfki11h
Static task
static1
Behavioral task
behavioral1
Sample
ad3ecf52e68a2185b53304bb858bb609_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ad3ecf52e68a2185b53304bb858bb609_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xtremerat
laptope.sytes.net
Targets
-
-
Target
ad3ecf52e68a2185b53304bb858bb609_JaffaCakes118
-
Size
596KB
-
MD5
ad3ecf52e68a2185b53304bb858bb609
-
SHA1
6d56e98364b99987d296cf90ab2ab0ce1448bbef
-
SHA256
3d18aadb4d297bd0173fb050a1907c3a1f6ea93142264fab50790454474afa34
-
SHA512
33f7278f6b50212d05e235dd0803c6c54d322f11298d32c1d5e5a96e76deeed80d38eeef4b098d911643c38ead28ca806a55d4a9428450dedaa0407a3aed10c8
-
SSDEEP
3072:YfluM7g422i4SzgHkdXEgw8bPba3xv68ERMHtbirXDtAvd46XFTmK11NfN:Yfki11h
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1