General
-
Target
JaffaCakes118_538ad6fc407f8042c63210a6a58158fd
-
Size
347KB
-
Sample
250129-gs5mgawkdr
-
MD5
538ad6fc407f8042c63210a6a58158fd
-
SHA1
55e9ec515b8d267d2c339c3c9f592d9ecbca9532
-
SHA256
1d794f1467a7d322c53c128dc386633ecb41eb50f1c90d197ad9a59e765e36cf
-
SHA512
76a60951c83c4f1ffe4fdf9cf0faf90831afda68162f2768b3650fde3b4cec53a0004db5ae09adc285d33a5c342fe5023120b1e2d4dd2701c7c87b2bf816f089
-
SSDEEP
6144:oAFELV9WkhHnkpPlxhPG+hxHLjdw/4NzNXn85R7Iuyuy8wFto3zpHEkGU2hn1XE2:oA6bf5Ud3rjdJzxVuy8WolkkERy2
Behavioral task
behavioral1
Sample
JaffaCakes118_538ad6fc407f8042c63210a6a58158fd.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_538ad6fc407f8042c63210a6a58158fd
-
Size
347KB
-
MD5
538ad6fc407f8042c63210a6a58158fd
-
SHA1
55e9ec515b8d267d2c339c3c9f592d9ecbca9532
-
SHA256
1d794f1467a7d322c53c128dc386633ecb41eb50f1c90d197ad9a59e765e36cf
-
SHA512
76a60951c83c4f1ffe4fdf9cf0faf90831afda68162f2768b3650fde3b4cec53a0004db5ae09adc285d33a5c342fe5023120b1e2d4dd2701c7c87b2bf816f089
-
SSDEEP
6144:oAFELV9WkhHnkpPlxhPG+hxHLjdw/4NzNXn85R7Iuyuy8wFto3zpHEkGU2hn1XE2:oA6bf5Ud3rjdJzxVuy8WolkkERy2
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1