General
-
Target
JaffaCakes118_5fe86862c9b4695ad9d48b95d980e44c
-
Size
316KB
-
Sample
250130-hfrera1pbw
-
MD5
5fe86862c9b4695ad9d48b95d980e44c
-
SHA1
f6d32f059a6d5975804fd311235c4d170c32d5c5
-
SHA256
32b110314b0940b544b4594403ec3968c9827423757ba9d09064467402016c26
-
SHA512
402b4d723c9414b51d714c2345fac054a4a2d428044cf1e2af411c808eaa101989f539f07f672975108716b6c4a5214ae119374f050cfce1cca374f1147ff21c
-
SSDEEP
3072:kmqzv/Ek0NBYAkafaUqTgLW+diiV4Co8kHoyA/xmpuHWmj3iHNk9PLeRQjVSzaQR:kmq4bhWlAo8khoH9zerM/K
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5fe86862c9b4695ad9d48b95d980e44c.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_5fe86862c9b4695ad9d48b95d980e44c
-
Size
316KB
-
MD5
5fe86862c9b4695ad9d48b95d980e44c
-
SHA1
f6d32f059a6d5975804fd311235c4d170c32d5c5
-
SHA256
32b110314b0940b544b4594403ec3968c9827423757ba9d09064467402016c26
-
SHA512
402b4d723c9414b51d714c2345fac054a4a2d428044cf1e2af411c808eaa101989f539f07f672975108716b6c4a5214ae119374f050cfce1cca374f1147ff21c
-
SSDEEP
3072:kmqzv/Ek0NBYAkafaUqTgLW+diiV4Co8kHoyA/xmpuHWmj3iHNk9PLeRQjVSzaQR:kmq4bhWlAo8khoH9zerM/K
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1