General
-
Target
65c7200faac8b0de62432214cc3a0629_JaffaCakes118
-
Size
712KB
-
Sample
241021-gxwkcssdkg
-
MD5
65c7200faac8b0de62432214cc3a0629
-
SHA1
0ad44042ddcf2b9ad73a99fe6fecc3fdb7bc6362
-
SHA256
516a16adb1641127e455c30ddb243c853057e5d0f5a2d7918a52e0e0ca570d33
-
SHA512
2b52aae864b764d4142f0a7ba5a944167568ad128445742e8ac92db45b0819246a8f51a93efba1741709e60f5a37f59d11489e0107dd2f2314b4b1c1204f5ae2
-
SSDEEP
12288:fOqBStmJ7uD4vqQOqCg/0+cdEuH8uitp4xieV31K93+:GCS8OTRdEuUpJGln
Static task
static1
Behavioral task
behavioral1
Sample
65c7200faac8b0de62432214cc3a0629_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
xtremerat
imaistroextr.zapto.org
Extracted
latentbot
imaistroextr.zapto.org
Targets
-
-
Target
65c7200faac8b0de62432214cc3a0629_JaffaCakes118
-
Size
712KB
-
MD5
65c7200faac8b0de62432214cc3a0629
-
SHA1
0ad44042ddcf2b9ad73a99fe6fecc3fdb7bc6362
-
SHA256
516a16adb1641127e455c30ddb243c853057e5d0f5a2d7918a52e0e0ca570d33
-
SHA512
2b52aae864b764d4142f0a7ba5a944167568ad128445742e8ac92db45b0819246a8f51a93efba1741709e60f5a37f59d11489e0107dd2f2314b4b1c1204f5ae2
-
SSDEEP
12288:fOqBStmJ7uD4vqQOqCg/0+cdEuH8uitp4xieV31K93+:GCS8OTRdEuUpJGln
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1