General
-
Target
b6d42934269f3d562d8c2cced6989844_JaffaCakes118
-
Size
317KB
-
Sample
241202-e8slqsvphr
-
MD5
b6d42934269f3d562d8c2cced6989844
-
SHA1
154dcd94848e0ebcbe2371e504663376968b90e7
-
SHA256
2a79b34582a8338b84952e2a989967f47310514b2aa185a814f76fd276001a2b
-
SHA512
edd33864945699765f5fbfaab60c419c235a3f2ecb26f38311350e16a8d06ef7c88ad4f819e961e8682d6141d711abd3645174f9a9b5f947e982e1aed0cca9b2
-
SSDEEP
6144:ElZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76lLIaluwkEgR:EHLUMuiv9RgfSjAzRtyVIFEgR
Behavioral task
behavioral1
Sample
b6d42934269f3d562d8c2cced6989844_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
b6d42934269f3d562d8c2cced6989844_JaffaCakes118
-
Size
317KB
-
MD5
b6d42934269f3d562d8c2cced6989844
-
SHA1
154dcd94848e0ebcbe2371e504663376968b90e7
-
SHA256
2a79b34582a8338b84952e2a989967f47310514b2aa185a814f76fd276001a2b
-
SHA512
edd33864945699765f5fbfaab60c419c235a3f2ecb26f38311350e16a8d06ef7c88ad4f819e961e8682d6141d711abd3645174f9a9b5f947e982e1aed0cca9b2
-
SSDEEP
6144:ElZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76lLIaluwkEgR:EHLUMuiv9RgfSjAzRtyVIFEgR
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1