General
-
Target
c45ab6184d8eb1407aeb9b4404340be3_JaffaCakes118
-
Size
371KB
-
Sample
240827-e6xsnsvdnn
-
MD5
c45ab6184d8eb1407aeb9b4404340be3
-
SHA1
205c017e57b403ba2250ca0db48e0f4eb598fa33
-
SHA256
03c4482ca7fcf996fa0851fadef694fd3eaa7a878dc64d7cc29fe051a9ac066d
-
SHA512
edf4dd7308de52314e78e84227ee33c1637fbecf23881982329cf1c6c7d360d83b08ac1a06b2f7498eaa50bc5720741f70497e4bfa0405df78d4721598a33b31
-
SSDEEP
6144:LZqoI1g3rJLCRgJyHxpxA6hz4VPy8SmR7eanY29rzXI:LZqoIsJLCWJyxzkAmBnXBI
Static task
static1
Behavioral task
behavioral1
Sample
c45ab6184d8eb1407aeb9b4404340be3_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
latentbot
geotradepopov.zapto.org
Targets
-
-
Target
c45ab6184d8eb1407aeb9b4404340be3_JaffaCakes118
-
Size
371KB
-
MD5
c45ab6184d8eb1407aeb9b4404340be3
-
SHA1
205c017e57b403ba2250ca0db48e0f4eb598fa33
-
SHA256
03c4482ca7fcf996fa0851fadef694fd3eaa7a878dc64d7cc29fe051a9ac066d
-
SHA512
edf4dd7308de52314e78e84227ee33c1637fbecf23881982329cf1c6c7d360d83b08ac1a06b2f7498eaa50bc5720741f70497e4bfa0405df78d4721598a33b31
-
SSDEEP
6144:LZqoI1g3rJLCRgJyHxpxA6hz4VPy8SmR7eanY29rzXI:LZqoIsJLCWJyxzkAmBnXBI
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1