Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
f198c48a8d0003c9bc62e299bd86eaff_JaffaCakes118
-
Size
314KB
-
Sample
241215-bjp8jazlds
-
MD5
f198c48a8d0003c9bc62e299bd86eaff
-
SHA1
7f9093e9c96b9811729d20816c7b1021f1baf160
-
SHA256
24844deb6bc575909d3f1512bfbb1393500ed275d43ed78cfabf8a4ab95508c9
-
SHA512
51ef5d07530b2082ecee80ab95946185506044a68d94e223b306f52cc37c38be0a8296de57e635aefa38eb12553b83cb94bfe370443204d67afbe710b395dcf6
-
SSDEEP
3072:5r/hHl/zZSc5H+FfTaHu6Y0qO4/PitFCoJq68sUO2A8+wJgMGtD65belaDg2wlgN:mkmhbtnd8qVMjptDHaDg2YoDA80bHI
Behavioral task
behavioral1
Sample
f198c48a8d0003c9bc62e299bd86eaff_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
rabah1627.zapto.org
Targets
-
-
Target
f198c48a8d0003c9bc62e299bd86eaff_JaffaCakes118
-
Size
314KB
-
MD5
f198c48a8d0003c9bc62e299bd86eaff
-
SHA1
7f9093e9c96b9811729d20816c7b1021f1baf160
-
SHA256
24844deb6bc575909d3f1512bfbb1393500ed275d43ed78cfabf8a4ab95508c9
-
SHA512
51ef5d07530b2082ecee80ab95946185506044a68d94e223b306f52cc37c38be0a8296de57e635aefa38eb12553b83cb94bfe370443204d67afbe710b395dcf6
-
SSDEEP
3072:5r/hHl/zZSc5H+FfTaHu6Y0qO4/PitFCoJq68sUO2A8+wJgMGtD65belaDg2wlgN:mkmhbtnd8qVMjptDHaDg2YoDA80bHI
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1