General
-
Target
fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118
-
Size
19KB
-
Sample
240927-nxt5vs1cpk
-
MD5
fa58cabbd68d1e46518aee4da3c88474
-
SHA1
d95d0b8d4df44fe546359558b350ded16548e7ee
-
SHA256
0e445703baf044431ce9a8c9c4198c56b285ad2108ace100b2469e3acb1971d9
-
SHA512
ff33fc2fe86728e759b47a3afe23ff15e35f31ef1b5fd55b2fe046afbbc1eab7c9937f542c142f4996001e799a1e2fcf4a10d2ad1f9918acde8ace0ee103d603
-
SSDEEP
384:EHKZfuH87GowDqGoMwevqxP6k6zIDwPVBSwdoCZ/wNJj7R:ZZfuHUvwDKP6kMpfdqN3
Behavioral task
behavioral1
Sample
fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118
-
Size
19KB
-
MD5
fa58cabbd68d1e46518aee4da3c88474
-
SHA1
d95d0b8d4df44fe546359558b350ded16548e7ee
-
SHA256
0e445703baf044431ce9a8c9c4198c56b285ad2108ace100b2469e3acb1971d9
-
SHA512
ff33fc2fe86728e759b47a3afe23ff15e35f31ef1b5fd55b2fe046afbbc1eab7c9937f542c142f4996001e799a1e2fcf4a10d2ad1f9918acde8ace0ee103d603
-
SSDEEP
384:EHKZfuH87GowDqGoMwevqxP6k6zIDwPVBSwdoCZ/wNJj7R:ZZfuHUvwDKP6kMpfdqN3
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1