General
-
Target
92dac7f9ef0fd5ec6fa15c8b532dc86f_JaffaCakes118
-
Size
54KB
-
Sample
241124-gf38wawra1
-
MD5
92dac7f9ef0fd5ec6fa15c8b532dc86f
-
SHA1
1ca45b3388f0dab33955a4c52b7649487a98998d
-
SHA256
bcb007991bf11f481e5203d3e71623e5fc03b2986328c400e067d030c8c16b8c
-
SHA512
42414aa2be543f44afe254015682a425ce1dc02de2683ae8bdb13f279143f7cff151855f15afc7258af60a6885a931fff732d511bee819c73d27e66577579548
-
SSDEEP
1536:690Z8GgMx+BUvk1XJ05X7bQUZoQ2HA0sj71V:6M/QuIJ05X7MUyQ2HE1V
Behavioral task
behavioral1
Sample
92dac7f9ef0fd5ec6fa15c8b532dc86f_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
xtremerat
almm.no-ip.biz
Targets
-
-
Target
92dac7f9ef0fd5ec6fa15c8b532dc86f_JaffaCakes118
-
Size
54KB
-
MD5
92dac7f9ef0fd5ec6fa15c8b532dc86f
-
SHA1
1ca45b3388f0dab33955a4c52b7649487a98998d
-
SHA256
bcb007991bf11f481e5203d3e71623e5fc03b2986328c400e067d030c8c16b8c
-
SHA512
42414aa2be543f44afe254015682a425ce1dc02de2683ae8bdb13f279143f7cff151855f15afc7258af60a6885a931fff732d511bee819c73d27e66577579548
-
SSDEEP
1536:690Z8GgMx+BUvk1XJ05X7bQUZoQ2HA0sj71V:6M/QuIJ05X7MUyQ2HE1V
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1