General
-
Target
2dd03951dc80a1c2bf043b2202f5acb0_JaffaCakes118
-
Size
219KB
-
Sample
241009-j8fdmaxhqm
-
MD5
2dd03951dc80a1c2bf043b2202f5acb0
-
SHA1
771374787516f26f5d157a295a060bc8912e86fc
-
SHA256
221cc2e2e82ea2cbb775af84c7f2a1c224266465d4b653613d765e5888651eed
-
SHA512
9dd20569973d2355b02c8058050c15545df8fa8771199d58f847a1afe42adda004ccb32a9b7a0ae50289ec90ec080c398e148bd9c94a3a01e6260cda64e816bd
-
SSDEEP
6144:CBIs4E0ZZhYjBO9wwqfKmrTDeCXFkvOTMU:wIb6jYqNrvjXFkvOTT
Behavioral task
behavioral1
Sample
2dd03951dc80a1c2bf043b2202f5acb0_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2dd03951dc80a1c2bf043b2202f5acb0_JaffaCakes118
-
Size
219KB
-
MD5
2dd03951dc80a1c2bf043b2202f5acb0
-
SHA1
771374787516f26f5d157a295a060bc8912e86fc
-
SHA256
221cc2e2e82ea2cbb775af84c7f2a1c224266465d4b653613d765e5888651eed
-
SHA512
9dd20569973d2355b02c8058050c15545df8fa8771199d58f847a1afe42adda004ccb32a9b7a0ae50289ec90ec080c398e148bd9c94a3a01e6260cda64e816bd
-
SSDEEP
6144:CBIs4E0ZZhYjBO9wwqfKmrTDeCXFkvOTMU:wIb6jYqNrvjXFkvOTT
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1