General
-
Target
bf2941f996c868b20d35e42cc3096783_JaffaCakes118
-
Size
21KB
-
Sample
241203-zkv26stkez
-
MD5
bf2941f996c868b20d35e42cc3096783
-
SHA1
2db5421ab5d2402d7ba5b3e7088e3b96acc63f62
-
SHA256
945a79cf1fdd8a72d24339c6d0e6b5d2543ba83bc5a9e70641774ae6813aa176
-
SHA512
218d2a0ceaa8acdde8d200e424a6d96334a3514b4c06c92390eab7233392b6e4b2949dcc21ba87d5b53bd9b8e2c3333767826158a24814bafe53a7d2384a6aa8
-
SSDEEP
384:rtIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlTpQ4KbIAbziQqepLR:xIsF81fG9QveLOYTe5Yi1pQl4Qb
Behavioral task
behavioral1
Sample
bf2941f996c868b20d35e42cc3096783_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
xtremerat
ahmed501.no-ip.biz
Targets
-
-
Target
bf2941f996c868b20d35e42cc3096783_JaffaCakes118
-
Size
21KB
-
MD5
bf2941f996c868b20d35e42cc3096783
-
SHA1
2db5421ab5d2402d7ba5b3e7088e3b96acc63f62
-
SHA256
945a79cf1fdd8a72d24339c6d0e6b5d2543ba83bc5a9e70641774ae6813aa176
-
SHA512
218d2a0ceaa8acdde8d200e424a6d96334a3514b4c06c92390eab7233392b6e4b2949dcc21ba87d5b53bd9b8e2c3333767826158a24814bafe53a7d2384a6aa8
-
SSDEEP
384:rtIdmF+Ti213fEF9QZd/cBr5M/gOjkaS4s/1k5YiZNlTpQ4KbIAbziQqepLR:xIsF81fG9QveLOYTe5Yi1pQl4Qb
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1