General
-
Target
40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118
-
Size
1.0MB
-
Sample
241013-tpk5wavgmg
-
MD5
40d35f1f6e71d5be3166dead89573bc8
-
SHA1
5f6291b39dac2622a6ea97fbad8a7d4235797178
-
SHA256
771d7a35e4e0b3fa80116af4b5e80afaefd24244e586950fd064574a997f1d72
-
SHA512
2116a68b554746ef5abc743b8f885956b2b6626b4358ffb36d069d834fd3dc1d3f0ec4c9ee455e01ee755d529cee1d83d3179130dc94fed244e3b258195df409
-
SSDEEP
12288:wOqBSe3b7MFJb7Mtx45EACL9NZ8JZi6MPNUp/musajK9I1yG88F+Nqhs:RCStUM5qjZQi6SNesajK9I1i8Frm
Static task
static1
Behavioral task
behavioral1
Sample
40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
youime.no-ip.info
Targets
-
-
Target
40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118
-
Size
1.0MB
-
MD5
40d35f1f6e71d5be3166dead89573bc8
-
SHA1
5f6291b39dac2622a6ea97fbad8a7d4235797178
-
SHA256
771d7a35e4e0b3fa80116af4b5e80afaefd24244e586950fd064574a997f1d72
-
SHA512
2116a68b554746ef5abc743b8f885956b2b6626b4358ffb36d069d834fd3dc1d3f0ec4c9ee455e01ee755d529cee1d83d3179130dc94fed244e3b258195df409
-
SSDEEP
12288:wOqBSe3b7MFJb7Mtx45EACL9NZ8JZi6MPNUp/musajK9I1yG88F+Nqhs:RCStUM5qjZQi6SNesajK9I1i8Frm
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1