General
-
Target
b939bbcdeb5a498e6be4528bb08bcd32_JaffaCakes118
-
Size
21KB
-
Sample
241202-vc4bcssqbv
-
MD5
b939bbcdeb5a498e6be4528bb08bcd32
-
SHA1
db7f66363caab73fe921b526671008a700bb9610
-
SHA256
b2684e98ff0d7550322e4bcdbed43bbd58553b47ed18e45f23c25c10f0c711d5
-
SHA512
541e247824b9363fe1d676572057f874835d66f401acbd2aee4e7350fe98c74130ca37d0b35e715ee878cb3dd2c6936f0cec336e7e5a88bb174e3928cae25392
-
SSDEEP
384:pIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlOUdwe5FKj5EMn0pLR:pIsF81fG9QveLOYTe5YioUdB6U
Behavioral task
behavioral1
Sample
b939bbcdeb5a498e6be4528bb08bcd32_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
hacker3oof.no-ip.biz
Targets
-
-
Target
b939bbcdeb5a498e6be4528bb08bcd32_JaffaCakes118
-
Size
21KB
-
MD5
b939bbcdeb5a498e6be4528bb08bcd32
-
SHA1
db7f66363caab73fe921b526671008a700bb9610
-
SHA256
b2684e98ff0d7550322e4bcdbed43bbd58553b47ed18e45f23c25c10f0c711d5
-
SHA512
541e247824b9363fe1d676572057f874835d66f401acbd2aee4e7350fe98c74130ca37d0b35e715ee878cb3dd2c6936f0cec336e7e5a88bb174e3928cae25392
-
SSDEEP
384:pIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlOUdwe5FKj5EMn0pLR:pIsF81fG9QveLOYTe5YioUdB6U
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1