General
-
Target
a2ed1f80ee06b027fc944d6c2f6b163c_JaffaCakes118
-
Size
608KB
-
Sample
241126-tr2kmsvngm
-
MD5
a2ed1f80ee06b027fc944d6c2f6b163c
-
SHA1
09e0348cf0db690ebb09afc0c34cf1c367cb3c84
-
SHA256
8019903919c7330a0b4d30dc339280a58736cd748ad8a045213e6f905893a7d1
-
SHA512
8be7ab788b4125b2139215f09be9239a4e410d8eea78917a7ac0907b1a90aa872627b88f8e2a0a6a6ed9291e3f9439064784baeb5e46b86308118a227201cdab
-
SSDEEP
3072:zPSntbmP+T1st246/YXyKqNaKniNMPKF9dE9kprz4c03rg6qF+c7Et7fa3/1vff:zPSXc1X
Static task
static1
Behavioral task
behavioral1
Sample
a2ed1f80ee06b027fc944d6c2f6b163c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2ed1f80ee06b027fc944d6c2f6b163c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xtremerat
laptope.sytes.net
Targets
-
-
Target
a2ed1f80ee06b027fc944d6c2f6b163c_JaffaCakes118
-
Size
608KB
-
MD5
a2ed1f80ee06b027fc944d6c2f6b163c
-
SHA1
09e0348cf0db690ebb09afc0c34cf1c367cb3c84
-
SHA256
8019903919c7330a0b4d30dc339280a58736cd748ad8a045213e6f905893a7d1
-
SHA512
8be7ab788b4125b2139215f09be9239a4e410d8eea78917a7ac0907b1a90aa872627b88f8e2a0a6a6ed9291e3f9439064784baeb5e46b86308118a227201cdab
-
SSDEEP
3072:zPSntbmP+T1st246/YXyKqNaKniNMPKF9dE9kprz4c03rg6qF+c7Et7fa3/1vff:zPSXc1X
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1