General
-
Target
3cf408cac2dcc3fce3389907877832b6_JaffaCakes118
-
Size
96KB
-
Sample
241013-bc7h8svfnk
-
MD5
3cf408cac2dcc3fce3389907877832b6
-
SHA1
3cb2303c833e27aad0754027d15cb287b5dc27ac
-
SHA256
ba259cb832ab8bb7110a6929a073755739b3d36de3f947674270d0b5291f8238
-
SHA512
91e4ef0b8e7009725812d3b2a1ff503fa1cbf3f312d3b6e59a8c59e8987e6117a726002d83ca3eae0b76a48e90e650f4e383b1f520a7217f9cb8b0a8c9571a35
-
SSDEEP
1536:MOghaZcYZqJC3xdTNYs9dhoh8SHsNqJH2/X99uwtw9n:MPaZ0JKSs3hPSMNRXN
Static task
static1
Behavioral task
behavioral1
Sample
3cf408cac2dcc3fce3389907877832b6_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
3cf408cac2dcc3fce3389907877832b6_JaffaCakes118
-
Size
96KB
-
MD5
3cf408cac2dcc3fce3389907877832b6
-
SHA1
3cb2303c833e27aad0754027d15cb287b5dc27ac
-
SHA256
ba259cb832ab8bb7110a6929a073755739b3d36de3f947674270d0b5291f8238
-
SHA512
91e4ef0b8e7009725812d3b2a1ff503fa1cbf3f312d3b6e59a8c59e8987e6117a726002d83ca3eae0b76a48e90e650f4e383b1f520a7217f9cb8b0a8c9571a35
-
SSDEEP
1536:MOghaZcYZqJC3xdTNYs9dhoh8SHsNqJH2/X99uwtw9n:MPaZ0JKSs3hPSMNRXN
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1