General
-
Target
JaffaCakes118_d5760a007025e479ab2260e5a169c096
-
Size
45KB
-
Sample
250119-3cel1azqa1
-
MD5
d5760a007025e479ab2260e5a169c096
-
SHA1
92bd74731bd1283c5d7d94c34944ccf1095fb05f
-
SHA256
10078ef6ba3b0c56240642a0ab8bea3def5b4fc8cb552972e883f63bb5a71a0b
-
SHA512
f9d4e2f15ead766f6b1230ef05796a61becb685370dd3e7afce5dd89abbd588f0a1b2bec4953e64c0210c660e86cecf5eba20845aee9ef7c25141a10d5cda6af
-
SSDEEP
768:VF3DQwxS6Z/4elNg9PJ3WBXQWJIiZg9Old1bSnGG+rkPts0E1sG90OYyJji0OSH:V5QAEeWPJ3WSCIml7SnGGDST1AOYeO0p
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d5760a007025e479ab2260e5a169c096.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d5760a007025e479ab2260e5a169c096.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xtremerat
蠀ӌmicrosoft2012.no-ip.biz
Targets
-
-
Target
JaffaCakes118_d5760a007025e479ab2260e5a169c096
-
Size
45KB
-
MD5
d5760a007025e479ab2260e5a169c096
-
SHA1
92bd74731bd1283c5d7d94c34944ccf1095fb05f
-
SHA256
10078ef6ba3b0c56240642a0ab8bea3def5b4fc8cb552972e883f63bb5a71a0b
-
SHA512
f9d4e2f15ead766f6b1230ef05796a61becb685370dd3e7afce5dd89abbd588f0a1b2bec4953e64c0210c660e86cecf5eba20845aee9ef7c25141a10d5cda6af
-
SSDEEP
768:VF3DQwxS6Z/4elNg9PJ3WBXQWJIiZg9Old1bSnGG+rkPts0E1sG90OYyJji0OSH:V5QAEeWPJ3WSCIml7SnGGDST1AOYeO0p
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1