General
-
Target
baa4577807099d5ef70c602515058c68_JaffaCakes118
-
Size
118KB
-
Sample
240823-gt6k6ayfkg
-
MD5
baa4577807099d5ef70c602515058c68
-
SHA1
a54569a382890354c833c47ccc211636e3724882
-
SHA256
149ce45bff7c375cd730b676804c3d25b9c37c4b0f4011a04837a0f0d62f8d43
-
SHA512
098f826edfb37a5b7ffc9d0010d687f099265ea287de315a5e9a41dff36d9a597550d04042af4991a84efae9c8bc9eb208255d8065bab63e0401c9b003a08abb
-
SSDEEP
1536:jF1Exu/SqzvEkjRHGaF1v50Aa1rteaVxR76CT13j8E1cQ1CwI510ZaNzizO9Na1v:jFexuznjTzs1BvZx3j/P5S6Za8zIlG
Static task
static1
Behavioral task
behavioral1
Sample
baa4577807099d5ef70c602515058c68_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
baa4577807099d5ef70c602515058c68_JaffaCakes118
-
Size
118KB
-
MD5
baa4577807099d5ef70c602515058c68
-
SHA1
a54569a382890354c833c47ccc211636e3724882
-
SHA256
149ce45bff7c375cd730b676804c3d25b9c37c4b0f4011a04837a0f0d62f8d43
-
SHA512
098f826edfb37a5b7ffc9d0010d687f099265ea287de315a5e9a41dff36d9a597550d04042af4991a84efae9c8bc9eb208255d8065bab63e0401c9b003a08abb
-
SSDEEP
1536:jF1Exu/SqzvEkjRHGaF1v50Aa1rteaVxR76CT13j8E1cQ1CwI510ZaNzizO9Na1v:jFexuznjTzs1BvZx3j/P5S6Za8zIlG
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1