General
-
Target
7b3a612f33be7d9e644486921bf34bd6_JaffaCakes118
-
Size
26KB
-
Sample
241029-aq7wgsymfk
-
MD5
7b3a612f33be7d9e644486921bf34bd6
-
SHA1
b0902378381a3b2242ed3f5ccf01b2e690fbb6d8
-
SHA256
c9879d14fbdff4bd53545aeca8f83c0a351b9975c3606b22c7401ae3b4d1b792
-
SHA512
bcc42f9cd2f2ec0032c9ff86d605fac463c9be7765f99a33452c3a190900f57630bc6757f9b8792a395a1de9132679ffa082bb34c58798270f1108b4ad647d1b
-
SSDEEP
384:OWpj7eNmfp+UrM8j3Mk8mw2Qwz9cEVWNuOuuOYPq8P9iYwbzuzExgJTknhhYGOD1:OTmfpbM8j8wQwz9caAuxYyu9ExEmQ
Behavioral task
behavioral1
Sample
7b3a612f33be7d9e644486921bf34bd6_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
7b3a612f33be7d9e644486921bf34bd6_JaffaCakes118
-
Size
26KB
-
MD5
7b3a612f33be7d9e644486921bf34bd6
-
SHA1
b0902378381a3b2242ed3f5ccf01b2e690fbb6d8
-
SHA256
c9879d14fbdff4bd53545aeca8f83c0a351b9975c3606b22c7401ae3b4d1b792
-
SHA512
bcc42f9cd2f2ec0032c9ff86d605fac463c9be7765f99a33452c3a190900f57630bc6757f9b8792a395a1de9132679ffa082bb34c58798270f1108b4ad647d1b
-
SSDEEP
384:OWpj7eNmfp+UrM8j3Mk8mw2Qwz9cEVWNuOuuOYPq8P9iYwbzuzExgJTknhhYGOD1:OTmfpbM8j8wQwz9caAuxYyu9ExEmQ
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1