General
-
Target
JaffaCakes118_6e83f18266276360aca11db133093aab
-
Size
383KB
-
Sample
250131-2j8mzs1ldp
-
MD5
6e83f18266276360aca11db133093aab
-
SHA1
9d09ce312df665e0971574db746a988f24d7c78b
-
SHA256
3cc3b390f139dfbcf74bd3f86259e47e0ce3f04610c88375f56d9b2aae8479ad
-
SHA512
b7ab08efca975a371f990c271d4beed083acb7b2ed36a8a7dc78f2b989a866c423934b1785d7a9221050c6400f7540d8fbea4265b2fdbb9249cc5df291235fc8
-
SSDEEP
6144:ozJqe4YmVxSWhn8ShFBEtXCVFQfFt5a0hcO3rgxzOf36wLj+SX9iroOiNN97oYLw:Ab41VxRh8SjqkzY5xhtU9i8DoNf9r
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6e83f18266276360aca11db133093aab.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_6e83f18266276360aca11db133093aab
-
Size
383KB
-
MD5
6e83f18266276360aca11db133093aab
-
SHA1
9d09ce312df665e0971574db746a988f24d7c78b
-
SHA256
3cc3b390f139dfbcf74bd3f86259e47e0ce3f04610c88375f56d9b2aae8479ad
-
SHA512
b7ab08efca975a371f990c271d4beed083acb7b2ed36a8a7dc78f2b989a866c423934b1785d7a9221050c6400f7540d8fbea4265b2fdbb9249cc5df291235fc8
-
SSDEEP
6144:ozJqe4YmVxSWhn8ShFBEtXCVFQfFt5a0hcO3rgxzOf36wLj+SX9iroOiNN97oYLw:Ab41VxRh8SjqkzY5xhtU9i8DoNf9r
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1