General
-
Target
JaffaCakes118_7ab423a0c3c7eeb3bb00d130e6b6f9bd
-
Size
608KB
-
Sample
250104-t4t2bszlaj
-
MD5
7ab423a0c3c7eeb3bb00d130e6b6f9bd
-
SHA1
23ecc0bb28e5c69b5a07cd215e34b2459ffa7f4e
-
SHA256
209b685ffe19683bfa33f9bb813abe69fd7df5d7260e186d09189d0764b61b5c
-
SHA512
dc2061ac9a1e7573348ac49514a6c905f3c756e4d5a366001ca76bb604e92f03fe4e967f65f843c82397e74cce938b32cc08261e9b193a91bb58270d291da93e
-
SSDEEP
12288:52u4sum+hlTEqUZoYX+KdC3R+kFifVucd4lJO2oT+VC/:pKmGlTEZo8eRpFifMK/
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7ab423a0c3c7eeb3bb00d130e6b6f9bd.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_7ab423a0c3c7eeb3bb00d130e6b6f9bd
-
Size
608KB
-
MD5
7ab423a0c3c7eeb3bb00d130e6b6f9bd
-
SHA1
23ecc0bb28e5c69b5a07cd215e34b2459ffa7f4e
-
SHA256
209b685ffe19683bfa33f9bb813abe69fd7df5d7260e186d09189d0764b61b5c
-
SHA512
dc2061ac9a1e7573348ac49514a6c905f3c756e4d5a366001ca76bb604e92f03fe4e967f65f843c82397e74cce938b32cc08261e9b193a91bb58270d291da93e
-
SSDEEP
12288:52u4sum+hlTEqUZoYX+KdC3R+kFifVucd4lJO2oT+VC/:pKmGlTEZo8eRpFifMK/
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1