General
-
Target
JaffaCakes118_3f363190678e26a115439539652a8f4e
-
Size
113KB
-
Sample
250127-ntzwyawqgv
-
MD5
3f363190678e26a115439539652a8f4e
-
SHA1
52f3e5ce495420a5b737a02708c9c8eb99e0e11c
-
SHA256
017b82ea2475a6c2b395c66f6fab225fca247d36f480c85cb2556cbbcc240558
-
SHA512
7a43198b4db8afa99d39f0bb75b5505487b49d87af8b96d3c1e97c5ac8008ae5b4d5ba8f84b653d6deadfe797f063926f87dad7d428d1ced5757b4e02d3394b6
-
SSDEEP
1536:ICSp7B0RGwWyuTYGUFwMeAur6vcOAFpRJNF+75DUSvHgMpvP5D9xS3rHBn7:Irdq8dEMF+ErFnJkUmAMVRmL17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3f363190678e26a115439539652a8f4e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3f363190678e26a115439539652a8f4e.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_3f363190678e26a115439539652a8f4e
-
Size
113KB
-
MD5
3f363190678e26a115439539652a8f4e
-
SHA1
52f3e5ce495420a5b737a02708c9c8eb99e0e11c
-
SHA256
017b82ea2475a6c2b395c66f6fab225fca247d36f480c85cb2556cbbcc240558
-
SHA512
7a43198b4db8afa99d39f0bb75b5505487b49d87af8b96d3c1e97c5ac8008ae5b4d5ba8f84b653d6deadfe797f063926f87dad7d428d1ced5757b4e02d3394b6
-
SSDEEP
1536:ICSp7B0RGwWyuTYGUFwMeAur6vcOAFpRJNF+75DUSvHgMpvP5D9xS3rHBn7:Irdq8dEMF+ErFnJkUmAMVRmL17
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1