General
-
Target
8bd8e4415921120e5381a8d0d6e97099_JaffaCakes118
-
Size
240KB
-
Sample
241103-rc9llaymcj
-
MD5
8bd8e4415921120e5381a8d0d6e97099
-
SHA1
8b9f58ac057c05db335f8d19818de827e0fb3b8c
-
SHA256
358a05a1b545dc2cf95b0c5081247f9fe2fce6f065b04d83d339fb71a748b22f
-
SHA512
ffd7289d23c12721ba2ca0a3ee2a790fd9308fb4be38ec09f5ce79c9ddbefb6e2d6b8850efb517b6d745d592fe509e56652a0a3db9654ff294ffc424ff3b28f8
-
SSDEEP
3072:aVnUJ8T2SXZyrgoBJtbN/3MCK2kevEwl/6GJHSp90uPrR5whRF0yXR3FeGABXurM:aVD/JdSI5ebm90mrRiP1eGANuTEU7ZWz
Static task
static1
Behavioral task
behavioral1
Sample
8bd8e4415921120e5381a8d0d6e97099_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
8bd8e4415921120e5381a8d0d6e97099_JaffaCakes118
-
Size
240KB
-
MD5
8bd8e4415921120e5381a8d0d6e97099
-
SHA1
8b9f58ac057c05db335f8d19818de827e0fb3b8c
-
SHA256
358a05a1b545dc2cf95b0c5081247f9fe2fce6f065b04d83d339fb71a748b22f
-
SHA512
ffd7289d23c12721ba2ca0a3ee2a790fd9308fb4be38ec09f5ce79c9ddbefb6e2d6b8850efb517b6d745d592fe509e56652a0a3db9654ff294ffc424ff3b28f8
-
SSDEEP
3072:aVnUJ8T2SXZyrgoBJtbN/3MCK2kevEwl/6GJHSp90uPrR5whRF0yXR3FeGABXurM:aVD/JdSI5ebm90mrRiP1eGANuTEU7ZWz
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1