General
-
Target
d098421bbda191cd8f280b315b94bf6a_JaffaCakes118
-
Size
243KB
-
Sample
240906-2tbe8ssajl
-
MD5
d098421bbda191cd8f280b315b94bf6a
-
SHA1
70f4e1ffb8dc6ec629c2db1f8417cd5f6ed8803e
-
SHA256
0119f29563c62c4cde5be8d8a1bf112204f859acf76ae4aa13a68198f899d965
-
SHA512
5234bda0be735a12dcfb9270f8513de3ea42f10ef36a5e914031e950afe7c5e8f089ae326dffd7ad3dd181bc4ca8165cb1e0bda1b3e6e3266dedacb4137c77c6
-
SSDEEP
3072:XFd2Afoka0uMMGYmKlMCJ+UrxkCkK9a7+Z3wCYdj8vK1HDvhk1eSkDyfCnewUmGc:1jQwuYKs7M3jvEu1nkaCneT3NmEQd
Static task
static1
Behavioral task
behavioral1
Sample
d098421bbda191cd8f280b315b94bf6a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d098421bbda191cd8f280b315b94bf6a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xtremerat
umtakcicek.dyndns.org
ࠁ谀umtakcicek.dyndns.org
Targets
-
-
Target
d098421bbda191cd8f280b315b94bf6a_JaffaCakes118
-
Size
243KB
-
MD5
d098421bbda191cd8f280b315b94bf6a
-
SHA1
70f4e1ffb8dc6ec629c2db1f8417cd5f6ed8803e
-
SHA256
0119f29563c62c4cde5be8d8a1bf112204f859acf76ae4aa13a68198f899d965
-
SHA512
5234bda0be735a12dcfb9270f8513de3ea42f10ef36a5e914031e950afe7c5e8f089ae326dffd7ad3dd181bc4ca8165cb1e0bda1b3e6e3266dedacb4137c77c6
-
SSDEEP
3072:XFd2Afoka0uMMGYmKlMCJ+UrxkCkK9a7+Z3wCYdj8vK1HDvhk1eSkDyfCnewUmGc:1jQwuYKs7M3jvEu1nkaCneT3NmEQd
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1