General
-
Target
90e7e7769bcfe54648081e72d431cb14_JaffaCakes118
-
Size
19KB
-
Sample
241123-1x8pgavngq
-
MD5
90e7e7769bcfe54648081e72d431cb14
-
SHA1
dde111ee0d0b65197e4edd08e51749fa490e1c4e
-
SHA256
e411beeed5be2a692c21c012c1339efdd7351caa3bdfa325b372891345c6a071
-
SHA512
587236e39d40392bbc2dbab8c88963047c6da70382c78a68a6b4bd61b8654bf5d3d03ccf86ade6a2230d69909fcd13b569f5fa5758c234ea70c422d941025d0f
-
SSDEEP
384:LHKZfuH87GowDqGoMwevqxP6k6zIDwPVBSxGuwG+UlLj7R:WZfuHUvwDKP6kMpIGuyUld
Behavioral task
behavioral1
Sample
90e7e7769bcfe54648081e72d431cb14_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
90e7e7769bcfe54648081e72d431cb14_JaffaCakes118
-
Size
19KB
-
MD5
90e7e7769bcfe54648081e72d431cb14
-
SHA1
dde111ee0d0b65197e4edd08e51749fa490e1c4e
-
SHA256
e411beeed5be2a692c21c012c1339efdd7351caa3bdfa325b372891345c6a071
-
SHA512
587236e39d40392bbc2dbab8c88963047c6da70382c78a68a6b4bd61b8654bf5d3d03ccf86ade6a2230d69909fcd13b569f5fa5758c234ea70c422d941025d0f
-
SSDEEP
384:LHKZfuH87GowDqGoMwevqxP6k6zIDwPVBSxGuwG+UlLj7R:WZfuHUvwDKP6kMpIGuyUld
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1