General
-
Target
37b13059d29d1d237237c7e39994bd28_JaffaCakes118
-
Size
301KB
-
Sample
241012-bd3axaybnn
-
MD5
37b13059d29d1d237237c7e39994bd28
-
SHA1
1ccebb230a943dbca2eda6d9ac3a83fa27b54bc4
-
SHA256
3359ebdee5962621391361cf2bdc2906b410e79dfc34dd64ba9b1a10b0ef4b8f
-
SHA512
1b6f8cf0a2a9008ee2021f32f85df638f27465e0c83e51d5238948eb75bdebc6695f6e64b66a2b9bf6fb3d95d69678249a86e64b98a2a3736c73dd6d973839df
-
SSDEEP
768:Q8m1Sq4NQErBsH1tzoisBKQI6dObAG/dq8uW29Ifnca/yyR+P2ujfGiiXzoigXY8:Ssq+QV4rObAdXWpf/y+3oqodoox
Behavioral task
behavioral1
Sample
37b13059d29d1d237237c7e39994bd28_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
deadslayerx7.no-ip.org
Targets
-
-
Target
37b13059d29d1d237237c7e39994bd28_JaffaCakes118
-
Size
301KB
-
MD5
37b13059d29d1d237237c7e39994bd28
-
SHA1
1ccebb230a943dbca2eda6d9ac3a83fa27b54bc4
-
SHA256
3359ebdee5962621391361cf2bdc2906b410e79dfc34dd64ba9b1a10b0ef4b8f
-
SHA512
1b6f8cf0a2a9008ee2021f32f85df638f27465e0c83e51d5238948eb75bdebc6695f6e64b66a2b9bf6fb3d95d69678249a86e64b98a2a3736c73dd6d973839df
-
SSDEEP
768:Q8m1Sq4NQErBsH1tzoisBKQI6dObAG/dq8uW29Ifnca/yyR+P2ujfGiiXzoigXY8:Ssq+QV4rObAdXWpf/y+3oqodoox
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1