General
-
Target
8c43ba596e217e1ec2770f189065c394_JaffaCakes118
-
Size
40KB
-
Sample
241103-tacvysxkby
-
MD5
8c43ba596e217e1ec2770f189065c394
-
SHA1
676510b07474fe48c7d9883a4307000556401b28
-
SHA256
b5c65b9de6adfb705887dc2346f41e649fcf977fdac33ce0afca327d1105daab
-
SHA512
a2a2ae7297d85c3cfd2322ae7e3182b1d484a68fcc27495483ff473b2b4c608cb78b3ed4234e60dd9112ca5d59f3b05ec39e401d47d8ae7d34e510fbb0bcd8cc
-
SSDEEP
768:NE9hYh7Nq2Ozhiow2Gkm6Bcn/9fzNBwIldwbzosd:Nu2hzOlw2GkmXnBBldw/ok
Behavioral task
behavioral1
Sample
8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8c43ba596e217e1ec2770f189065c394_JaffaCakes118
-
Size
40KB
-
MD5
8c43ba596e217e1ec2770f189065c394
-
SHA1
676510b07474fe48c7d9883a4307000556401b28
-
SHA256
b5c65b9de6adfb705887dc2346f41e649fcf977fdac33ce0afca327d1105daab
-
SHA512
a2a2ae7297d85c3cfd2322ae7e3182b1d484a68fcc27495483ff473b2b4c608cb78b3ed4234e60dd9112ca5d59f3b05ec39e401d47d8ae7d34e510fbb0bcd8cc
-
SSDEEP
768:NE9hYh7Nq2Ozhiow2Gkm6Bcn/9fzNBwIldwbzosd:Nu2hzOlw2GkmXnBBldw/ok
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1