General
-
Target
c7b120c6f6ca738935c52d1d5ac51c31_JaffaCakes118
-
Size
202KB
-
Sample
241205-pl9a3svjat
-
MD5
c7b120c6f6ca738935c52d1d5ac51c31
-
SHA1
46895102e0f18cde91cdb1d722051d195b5ee119
-
SHA256
ed22a06dfcd4048b5a01dec6be5066bd24de6f9b1e6261ed9e972351424e884d
-
SHA512
d08515a73543290034e0ec6ebebd3102695a0377493087a985d7b770f65eaffe02cab8d310350ccf9e740255441ebae92aa1cdc2037586dc3b207adb38b12cdf
-
SSDEEP
3072:ArBkJSHg3/WoXpO5qeRcVYxSpIIQbe4nNw6Jvgy1BYXkZ5xroPfsneaGtugcfgNk:Aiz1kqeqVYxSpInlvgercF6gcfj
Static task
static1
Behavioral task
behavioral1
Sample
c7b120c6f6ca738935c52d1d5ac51c31_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c7b120c6f6ca738935c52d1d5ac51c31_JaffaCakes118
-
Size
202KB
-
MD5
c7b120c6f6ca738935c52d1d5ac51c31
-
SHA1
46895102e0f18cde91cdb1d722051d195b5ee119
-
SHA256
ed22a06dfcd4048b5a01dec6be5066bd24de6f9b1e6261ed9e972351424e884d
-
SHA512
d08515a73543290034e0ec6ebebd3102695a0377493087a985d7b770f65eaffe02cab8d310350ccf9e740255441ebae92aa1cdc2037586dc3b207adb38b12cdf
-
SSDEEP
3072:ArBkJSHg3/WoXpO5qeRcVYxSpIIQbe4nNw6Jvgy1BYXkZ5xroPfsneaGtugcfgNk:Aiz1kqeqVYxSpInlvgercF6gcfj
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1