General
-
Target
611c584afb9218c85e2a72c9aa87dd1c_JaffaCakes118
-
Size
21KB
-
Sample
241020-jltmqsxamf
-
MD5
611c584afb9218c85e2a72c9aa87dd1c
-
SHA1
0cdf8f22a99f96075c38ce5bfdcd6a44757d6f4a
-
SHA256
c9f499fb4b8e30669c51e80f2ebe98a6686ccd54069066b74dd9f1a0e9eb01c6
-
SHA512
54eb49b345dda2e267babaf1d1a15fc0b55e28be47c3e2d6a2cb40fbba1c7d77b6db44e4e6869c2a532092c90093ed8c0c8f2f205b61a7a2879204e830d0d92f
-
SSDEEP
384:AIdmF+TH95xJMu/0PlxjV8BINhuLJ37tMOpuqqz3KK7eIVmiM1QdaKxqEpLR:AIsF8HdbKjV8BX7Vy6K7eIVTAQdSE
Behavioral task
behavioral1
Sample
611c584afb9218c85e2a72c9aa87dd1c_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
uranio.no-ip.biz
Targets
-
-
Target
611c584afb9218c85e2a72c9aa87dd1c_JaffaCakes118
-
Size
21KB
-
MD5
611c584afb9218c85e2a72c9aa87dd1c
-
SHA1
0cdf8f22a99f96075c38ce5bfdcd6a44757d6f4a
-
SHA256
c9f499fb4b8e30669c51e80f2ebe98a6686ccd54069066b74dd9f1a0e9eb01c6
-
SHA512
54eb49b345dda2e267babaf1d1a15fc0b55e28be47c3e2d6a2cb40fbba1c7d77b6db44e4e6869c2a532092c90093ed8c0c8f2f205b61a7a2879204e830d0d92f
-
SSDEEP
384:AIdmF+TH95xJMu/0PlxjV8BINhuLJ37tMOpuqqz3KK7eIVmiM1QdaKxqEpLR:AIsF8HdbKjV8BX7Vy6K7eIVTAQdSE
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1