General
-
Target
cf5eaf5016b20b65c805de7e5e074a85_JaffaCakes118
-
Size
728KB
-
Sample
240906-mvkyqssalj
-
MD5
cf5eaf5016b20b65c805de7e5e074a85
-
SHA1
1b89c182e8421d1b28feec2308cfbb1ce455dd79
-
SHA256
54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422
-
SHA512
b3a6cb9d8d686ea1f4ce312ef6f0269cee5fa3df1eb773f672ff2aa2da6c6a0e1b40acedaa8e3fd1fb723304f0e61455886872fb0622368b64cc5a4e98d03158
-
SSDEEP
12288:UY3h8l+++++++++0x0XSJgr8TnVEv+vl+D1PXd:xh8l+++++++++0+XNr8ZEvKlGP
Static task
static1
Behavioral task
behavioral1
Sample
cf5eaf5016b20b65c805de7e5e074a85_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xpertrat
3.0.10
PUNCHES
46.183.220.14:1149
A1F5W2I0-X6V4-U5T1-T8J1-J5Y8L0L337W4
Targets
-
-
Target
cf5eaf5016b20b65c805de7e5e074a85_JaffaCakes118
-
Size
728KB
-
MD5
cf5eaf5016b20b65c805de7e5e074a85
-
SHA1
1b89c182e8421d1b28feec2308cfbb1ce455dd79
-
SHA256
54fe3fb46b47d290445662882ddf2e20b65306ff7d1ff1d9878b5b9ef5632422
-
SHA512
b3a6cb9d8d686ea1f4ce312ef6f0269cee5fa3df1eb773f672ff2aa2da6c6a0e1b40acedaa8e3fd1fb723304f0e61455886872fb0622368b64cc5a4e98d03158
-
SSDEEP
12288:UY3h8l+++++++++0x0XSJgr8TnVEv+vl+D1PXd:xh8l+++++++++0+XNr8ZEvKlGP
-
XpertRAT Core payload
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
7