General
-
Target
934b9bf7a3a513cb330656bdceb09359_JaffaCakes118
-
Size
130KB
-
Sample
241124-jbf9nazncz
-
MD5
934b9bf7a3a513cb330656bdceb09359
-
SHA1
1c463f65cd451e6291bedfc38bd06ca172fc6cba
-
SHA256
ff3e4d0ad10320a804f277918b8914803b995d1b46f5c3a82636b378364bd5e2
-
SHA512
a329d83bdb661ead25bb922aa5b0337d6f625947dcb652ceae3573a4f20f8dc76e5f2a5d1ca63bbe86cef944259fa74251bbefd14d59d9496ca099942c9952dc
-
SSDEEP
3072:m1QMh8DB5J9Sb4g7uigN2KCotYCg4TILnW5NTG8x:rG8bJ9Sb4gM2nCg4kinx
Behavioral task
behavioral1
Sample
934b9bf7a3a513cb330656bdceb09359_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
xtremerat
mastino.no-ip.org
Targets
-
-
Target
934b9bf7a3a513cb330656bdceb09359_JaffaCakes118
-
Size
130KB
-
MD5
934b9bf7a3a513cb330656bdceb09359
-
SHA1
1c463f65cd451e6291bedfc38bd06ca172fc6cba
-
SHA256
ff3e4d0ad10320a804f277918b8914803b995d1b46f5c3a82636b378364bd5e2
-
SHA512
a329d83bdb661ead25bb922aa5b0337d6f625947dcb652ceae3573a4f20f8dc76e5f2a5d1ca63bbe86cef944259fa74251bbefd14d59d9496ca099942c9952dc
-
SSDEEP
3072:m1QMh8DB5J9Sb4g7uigN2KCotYCg4TILnW5NTG8x:rG8bJ9Sb4gM2nCg4kinx
-
Detect XtremeRAT payload
-
Modifies firewall policy service
-
Sality family
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5