General
-
Target
6957193727c47e3125d25ad04b763bcc_JaffaCakes118
-
Size
144KB
-
Sample
241022-hex6xascmg
-
MD5
6957193727c47e3125d25ad04b763bcc
-
SHA1
eac28b8fb99bda5cead28b52112671a222dec213
-
SHA256
fca938a9249dd5b49bd71e003a77928436fa9a8329d3e40bf64dfb0eb2828ae9
-
SHA512
4b5044bb4f92aa92a1e954922f7aa3b2ab2e53e59f8d5c05e0ff9942e92d89aa608ff16b2fc53cab8e10488113ef0b8e1b9bc591c78c135af1814ed7dc975f5d
-
SSDEEP
1536:glQbC086HfA6wKBZbryh0Vttv+uuvBIIZ7KwEGMGVtc906jZh:gybCUI4tgvnxxEmH6jv
Static task
static1
Behavioral task
behavioral1
Sample
6957193727c47e3125d25ad04b763bcc_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
ayada.no-ip.info
Targets
-
-
Target
6957193727c47e3125d25ad04b763bcc_JaffaCakes118
-
Size
144KB
-
MD5
6957193727c47e3125d25ad04b763bcc
-
SHA1
eac28b8fb99bda5cead28b52112671a222dec213
-
SHA256
fca938a9249dd5b49bd71e003a77928436fa9a8329d3e40bf64dfb0eb2828ae9
-
SHA512
4b5044bb4f92aa92a1e954922f7aa3b2ab2e53e59f8d5c05e0ff9942e92d89aa608ff16b2fc53cab8e10488113ef0b8e1b9bc591c78c135af1814ed7dc975f5d
-
SSDEEP
1536:glQbC086HfA6wKBZbryh0Vttv+uuvBIIZ7KwEGMGVtc906jZh:gybCUI4tgvnxxEmH6jv
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1