General
-
Target
JaffaCakes118_a4e6731d6dfb5fc2aec67f948531f2a3
-
Size
280KB
-
Sample
250118-kfmsnsyphq
-
MD5
a4e6731d6dfb5fc2aec67f948531f2a3
-
SHA1
2547612b3e99595ec3f781b3f4330e1984187d4b
-
SHA256
22e1a12e81de9af68abc0dfc9297db0d4e85ba89cda1b3f09e861bc16653c671
-
SHA512
9fa8b8c691a1346eac3cd07307eed1956ed1dc44952bd48a2a16e515f88d4cd40fa2f867bb954645a4c848a587c203b0192dfde91a8f49f18ecd771ac2fffa3c
-
SSDEEP
6144:oBfoRaU6E0ugM1Mc+2Pn81iJt2+/XNgjDMr1gkaAO/74+:omV6EgM1pP81it2+/dcDMreky7N
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a4e6731d6dfb5fc2aec67f948531f2a3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a4e6731d6dfb5fc2aec67f948531f2a3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xtremerat
Ɛᮽ唅∛i2lb.sytes.net
Targets
-
-
Target
JaffaCakes118_a4e6731d6dfb5fc2aec67f948531f2a3
-
Size
280KB
-
MD5
a4e6731d6dfb5fc2aec67f948531f2a3
-
SHA1
2547612b3e99595ec3f781b3f4330e1984187d4b
-
SHA256
22e1a12e81de9af68abc0dfc9297db0d4e85ba89cda1b3f09e861bc16653c671
-
SHA512
9fa8b8c691a1346eac3cd07307eed1956ed1dc44952bd48a2a16e515f88d4cd40fa2f867bb954645a4c848a587c203b0192dfde91a8f49f18ecd771ac2fffa3c
-
SSDEEP
6144:oBfoRaU6E0ugM1Mc+2Pn81iJt2+/XNgjDMr1gkaAO/74+:omV6EgM1pP81it2+/dcDMreky7N
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1