General
-
Target
JaffaCakes118_7ab6bd1aa0a16495aa08198437c3ff30
-
Size
64KB
-
Sample
250104-t6c6lazldr
-
MD5
7ab6bd1aa0a16495aa08198437c3ff30
-
SHA1
2b225d1e33ee0ce95dce372d8d03a9bc219bd205
-
SHA256
4de655fedd87668e4c5a37a39e6b8049b87bf7c4638b6b38c12442441594b7b1
-
SHA512
1d8d2639abad26ffc019750cb993ff20a625f4dc723383bf3dcc87db6a0b5dd98adf67e2317ef474152096d0a1df7d0b21af4039185705c335ac3568e0673a4b
-
SSDEEP
1536:U8+D7t0E0RGnl9T039GLI1niVGRwghzpa:UfD770wnl9Yr1nthhz
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7ab6bd1aa0a16495aa08198437c3ff30.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_7ab6bd1aa0a16495aa08198437c3ff30
-
Size
64KB
-
MD5
7ab6bd1aa0a16495aa08198437c3ff30
-
SHA1
2b225d1e33ee0ce95dce372d8d03a9bc219bd205
-
SHA256
4de655fedd87668e4c5a37a39e6b8049b87bf7c4638b6b38c12442441594b7b1
-
SHA512
1d8d2639abad26ffc019750cb993ff20a625f4dc723383bf3dcc87db6a0b5dd98adf67e2317ef474152096d0a1df7d0b21af4039185705c335ac3568e0673a4b
-
SSDEEP
1536:U8+D7t0E0RGnl9T039GLI1niVGRwghzpa:UfD770wnl9Yr1nthhz
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1