General
-
Target
JaffaCakes118_346c6012a915bd9991f5bd367b5ddaed
-
Size
192KB
-
Sample
250126-lqafrszkbm
-
MD5
346c6012a915bd9991f5bd367b5ddaed
-
SHA1
5fede2bbaf4fffcaf6113c62cb7cb1d830b7926b
-
SHA256
07e1821f25247fe00077540c9ea9ddead92e91c40bc58be5c9962c38107802e8
-
SHA512
03e53c1c589e1e041beb72dcfd69bfa10c6b4d447311edd96ade63028b60136f4d9f739f84a9e93c6cd5f348bea08bf740bd81d80fb7e09708a4360ba41c3c49
-
SSDEEP
3072:qezNcARiXE1d+1mfA69pOevJtNx1FMPKGzaWrskkkPKF8/Gcv:q248pOextNx1
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_346c6012a915bd9991f5bd367b5ddaed.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_346c6012a915bd9991f5bd367b5ddaed
-
Size
192KB
-
MD5
346c6012a915bd9991f5bd367b5ddaed
-
SHA1
5fede2bbaf4fffcaf6113c62cb7cb1d830b7926b
-
SHA256
07e1821f25247fe00077540c9ea9ddead92e91c40bc58be5c9962c38107802e8
-
SHA512
03e53c1c589e1e041beb72dcfd69bfa10c6b4d447311edd96ade63028b60136f4d9f739f84a9e93c6cd5f348bea08bf740bd81d80fb7e09708a4360ba41c3c49
-
SSDEEP
3072:qezNcARiXE1d+1mfA69pOevJtNx1FMPKGzaWrskkkPKF8/Gcv:q248pOextNx1
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1