General
-
Target
2531c79089181552ccdf9b03ead86b87_JaffaCakes118
-
Size
79KB
-
Sample
241008-zjj9aavcll
-
MD5
2531c79089181552ccdf9b03ead86b87
-
SHA1
12690b1b72baab39cee5c4a7e6298416ca63b90b
-
SHA256
e0fc93cba4229a564fb24a805f193dc1b2645acef42797892b4d4a1ad64467bd
-
SHA512
f5afce95798a01e97dd24b55460b82832589660e423d6ef7ef07e32178e0d5a0c538fd84c767eb05c8db19d66e29b2c38c34405802911a0f977fc72fa9102ff4
-
SSDEEP
1536:OBn+qTxEJxCme7B/QQEwRYrRdgnBipBbOOjJOqeok9uZUG:+n+qTxEKFTWtdgn4pDh5kPG
Static task
static1
Behavioral task
behavioral1
Sample
2531c79089181552ccdf9b03ead86b87_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
configure.zapto.org
Targets
-
-
Target
2531c79089181552ccdf9b03ead86b87_JaffaCakes118
-
Size
79KB
-
MD5
2531c79089181552ccdf9b03ead86b87
-
SHA1
12690b1b72baab39cee5c4a7e6298416ca63b90b
-
SHA256
e0fc93cba4229a564fb24a805f193dc1b2645acef42797892b4d4a1ad64467bd
-
SHA512
f5afce95798a01e97dd24b55460b82832589660e423d6ef7ef07e32178e0d5a0c538fd84c767eb05c8db19d66e29b2c38c34405802911a0f977fc72fa9102ff4
-
SSDEEP
1536:OBn+qTxEJxCme7B/QQEwRYrRdgnBipBbOOjJOqeok9uZUG:+n+qTxEKFTWtdgn4pDh5kPG
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2