General
-
Target
JaffaCakes118_3e457844b2c86318978a9dca7c16ea01
-
Size
140KB
-
Sample
250127-lnchcatmdn
-
MD5
3e457844b2c86318978a9dca7c16ea01
-
SHA1
a48e76b50a991ee8c4a3c2d28dc57d641a24d948
-
SHA256
627ceaf89ceee80d867b0393b6a17f68dece9f1c22003a5998cf02b036b46ffd
-
SHA512
1e77ca0f7e332ff4ea4427e1ae3e85b9f3d690f60306032609af81ad0a836adddb23dc2eb608fe4465b3feb227a53bed60275600cde255c34d093adebff0f3d9
-
SSDEEP
1536:tLNZcwmjhWyVIIm4RT2XXWxr8z+LY2G7RZ6ajv4WcD7HzjhABHs7ZGMVa:txmwwhWyNRTEWN8z+LY2SRZnR8SHsfA
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3e457844b2c86318978a9dca7c16ea01.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_3e457844b2c86318978a9dca7c16ea01
-
Size
140KB
-
MD5
3e457844b2c86318978a9dca7c16ea01
-
SHA1
a48e76b50a991ee8c4a3c2d28dc57d641a24d948
-
SHA256
627ceaf89ceee80d867b0393b6a17f68dece9f1c22003a5998cf02b036b46ffd
-
SHA512
1e77ca0f7e332ff4ea4427e1ae3e85b9f3d690f60306032609af81ad0a836adddb23dc2eb608fe4465b3feb227a53bed60275600cde255c34d093adebff0f3d9
-
SSDEEP
1536:tLNZcwmjhWyVIIm4RT2XXWxr8z+LY2G7RZ6ajv4WcD7HzjhABHs7ZGMVa:txmwwhWyNRTEWN8z+LY2SRZnR8SHsfA
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1