General
-
Target
JaffaCakes118_0f7390259830775b5eeaa5b9d286ed53
-
Size
132KB
-
Sample
250112-qezzhawlcp
-
MD5
0f7390259830775b5eeaa5b9d286ed53
-
SHA1
3bb255d0d01da4241d084f10605c41c6854f831e
-
SHA256
1ff43d080aaae002d192686f7788267c1ed7ba649a3c6d99bd8d9748a3527f88
-
SHA512
bac28a677c54df7c97a3f91598591bf41a588cecb446e33b60fc3e79d2a0688a4da0e85f198abbbb86352949bb3cd3f5b1e8f55f1b6d1b1770ed4e33a0cb982d
-
SSDEEP
3072:Ste8nF0cuusPAa8guWeqQYFUncOGokQ2dU+nu2vIGR5oLLc:ShnuL7grcOGok9d82vJroLg
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0f7390259830775b5eeaa5b9d286ed53.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_0f7390259830775b5eeaa5b9d286ed53
-
Size
132KB
-
MD5
0f7390259830775b5eeaa5b9d286ed53
-
SHA1
3bb255d0d01da4241d084f10605c41c6854f831e
-
SHA256
1ff43d080aaae002d192686f7788267c1ed7ba649a3c6d99bd8d9748a3527f88
-
SHA512
bac28a677c54df7c97a3f91598591bf41a588cecb446e33b60fc3e79d2a0688a4da0e85f198abbbb86352949bb3cd3f5b1e8f55f1b6d1b1770ed4e33a0cb982d
-
SSDEEP
3072:Ste8nF0cuusPAa8guWeqQYFUncOGokQ2dU+nu2vIGR5oLLc:ShnuL7grcOGok9d82vJroLg
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1