General
-
Target
JaffaCakes118_9d650e896e766de288249fbe7c78c094
-
Size
260KB
-
Sample
250118-c2nyvs1kfn
-
MD5
9d650e896e766de288249fbe7c78c094
-
SHA1
96133f7d79b6e848f458a45ecae574cdcf96348c
-
SHA256
1749b7cea124ab793e8ef0b75cdae5d8df41990cc0ee54495a5fda699c2f678e
-
SHA512
e767811bd8ca09027fbd46443844e52d4c84f441236c12204e9eb4fc476c5b37f108a06f36b391b138f75553e6301618ae9ae2e8e77aca5a8f9314a1a3171bb9
-
SSDEEP
6144:HEUbLWSEHUHR30o4OzUBOqWzBf3DX92IeiuxCiaV889bvQs1xeCMgiXs5+qbM3:kYBf3DXQItuxCRScbIs1xlMgiXs5+qb+
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9d650e896e766de288249fbe7c78c094.exe
Resource
win7-20241023-en
Malware Config
Extracted
xtremerat
Smaske.no-ip.biz
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_9d650e896e766de288249fbe7c78c094
-
Size
260KB
-
MD5
9d650e896e766de288249fbe7c78c094
-
SHA1
96133f7d79b6e848f458a45ecae574cdcf96348c
-
SHA256
1749b7cea124ab793e8ef0b75cdae5d8df41990cc0ee54495a5fda699c2f678e
-
SHA512
e767811bd8ca09027fbd46443844e52d4c84f441236c12204e9eb4fc476c5b37f108a06f36b391b138f75553e6301618ae9ae2e8e77aca5a8f9314a1a3171bb9
-
SSDEEP
6144:HEUbLWSEHUHR30o4OzUBOqWzBf3DX92IeiuxCiaV889bvQs1xeCMgiXs5+qbM3:kYBf3DXQItuxCRScbIs1xlMgiXs5+qb+
-
Detect XtremeRAT payload
-
Modifies firewall policy service
-
Sality family
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7