General
-
Target
f18b9e3bb58a0262e9620e8aa1d78f18_JaffaCakes118
-
Size
206KB
-
Sample
241215-ba58ds1mcm
-
MD5
f18b9e3bb58a0262e9620e8aa1d78f18
-
SHA1
4d9606a8cf0d40d56306453d481029acba358517
-
SHA256
758210b041abec8256d65dbf7e223222bcff6f848299425ead942ae4d0eb7e20
-
SHA512
c74315c3b155911530fa2ee1433bf393617d087c19ecbb398978fd38462e5830cd1b244e2f4606721ffb454d9693300900f36c43a158a5a1932d68a9a3d51656
-
SSDEEP
3072:Ndz60Ru+9vLZCnbPeGG1u4nDvhoZK4LpepIjpB:Ng0/tV0bPeGenjhM7jb
Behavioral task
behavioral1
Sample
f18b9e3bb58a0262e9620e8aa1d78f18_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
gamelistview.no-ip.org
Targets
-
-
Target
f18b9e3bb58a0262e9620e8aa1d78f18_JaffaCakes118
-
Size
206KB
-
MD5
f18b9e3bb58a0262e9620e8aa1d78f18
-
SHA1
4d9606a8cf0d40d56306453d481029acba358517
-
SHA256
758210b041abec8256d65dbf7e223222bcff6f848299425ead942ae4d0eb7e20
-
SHA512
c74315c3b155911530fa2ee1433bf393617d087c19ecbb398978fd38462e5830cd1b244e2f4606721ffb454d9693300900f36c43a158a5a1932d68a9a3d51656
-
SSDEEP
3072:Ndz60Ru+9vLZCnbPeGG1u4nDvhoZK4LpepIjpB:Ng0/tV0bPeGenjhM7jb
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1