General
-
Target
7573f260584e77ff3fc8466bf97e869c_JaffaCakes118
-
Size
81KB
-
Sample
241025-aqjhwsyhjc
-
MD5
7573f260584e77ff3fc8466bf97e869c
-
SHA1
8a986404666dacc90a096b775770acf0bd89c68e
-
SHA256
7ac4d003519a7320b9f78da2e8c3cf3403723b6953d880de7729a1944b6a7538
-
SHA512
480986f1c52d6bc8ac22acc2fe3beea0691511f7d43dd5a54d02981da458c3894b5090d8f6a171bb5f0f7a153153757a6767f559f61766a67cf85643fee2664f
-
SSDEEP
1536:ufjaSbVWcQQFVyoAX/XFlQaQYGvEqvyzqcWvCIBvZ:6jaeY9QFVyoAIdvE8IWvCI1Z
Static task
static1
Behavioral task
behavioral1
Sample
7573f260584e77ff3fc8466bf97e869c_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
xtremerat
4ƣ借俠pink2010.no-ip.org
Targets
-
-
Target
7573f260584e77ff3fc8466bf97e869c_JaffaCakes118
-
Size
81KB
-
MD5
7573f260584e77ff3fc8466bf97e869c
-
SHA1
8a986404666dacc90a096b775770acf0bd89c68e
-
SHA256
7ac4d003519a7320b9f78da2e8c3cf3403723b6953d880de7729a1944b6a7538
-
SHA512
480986f1c52d6bc8ac22acc2fe3beea0691511f7d43dd5a54d02981da458c3894b5090d8f6a171bb5f0f7a153153757a6767f559f61766a67cf85643fee2664f
-
SSDEEP
1536:ufjaSbVWcQQFVyoAX/XFlQaQYGvEqvyzqcWvCIBvZ:6jaeY9QFVyoAIdvE8IWvCI1Z
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1