General
-
Target
82d4848af83cbe287d12dab83a5cc2cb_JaffaCakes118
-
Size
4.9MB
-
Sample
241031-nlhmpawjbs
-
MD5
82d4848af83cbe287d12dab83a5cc2cb
-
SHA1
b81f86207a4a115e764cfd6e2f484d1989536423
-
SHA256
4676808324eee00c7f4e07a2e39bf148b18728511d56b72ccce7b96ead559445
-
SHA512
0f2e5607915529ae156bb2b42e5b37459151bce98220c2bd5a244adbe96e5f78c2479efac8d3d126a3e07b8157f0030ffdf0d2e9b5561c366ec4642b841b6ae1
-
SSDEEP
98304:zMIUCd4ys7sl28GQ0vQ8nWvrQbCH1bM65wfdIkzyIn9OhbFvZvnjgXWD:g8dmM2BvRn4hY1IkRavZP9
Behavioral task
behavioral1
Sample
82d4848af83cbe287d12dab83a5cc2cb_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
82d4848af83cbe287d12dab83a5cc2cb_JaffaCakes118
-
Size
4.9MB
-
MD5
82d4848af83cbe287d12dab83a5cc2cb
-
SHA1
b81f86207a4a115e764cfd6e2f484d1989536423
-
SHA256
4676808324eee00c7f4e07a2e39bf148b18728511d56b72ccce7b96ead559445
-
SHA512
0f2e5607915529ae156bb2b42e5b37459151bce98220c2bd5a244adbe96e5f78c2479efac8d3d126a3e07b8157f0030ffdf0d2e9b5561c366ec4642b841b6ae1
-
SSDEEP
98304:zMIUCd4ys7sl28GQ0vQ8nWvrQbCH1bM65wfdIkzyIn9OhbFvZvnjgXWD:g8dmM2BvRn4hY1IkRavZP9
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1