General
-
Target
JaffaCakes118_6a9388e7d70e460e4c4fb99c3a9ffc37
-
Size
250KB
-
Sample
250131-qkkf1aymdp
-
MD5
6a9388e7d70e460e4c4fb99c3a9ffc37
-
SHA1
71628bd8d8499472ed808a66819d284bf5b8ae49
-
SHA256
3e776d11b420660ffbbe73f18affe85e09c70914dd55b56b8088bf707ba58cbd
-
SHA512
a74cffedf367c28f1f6f5e062d5fdad43b2617c47046f3aa58fb13cbb060ac75c7ee80e2fcc467344d8629676889ebf31587f3077853ea5464ecb6e2aef6e90b
-
SSDEEP
3072:dsyONZz0y6eZkGkBeLkeos8kXV6ndv3lxD7KyALWAHXDpuadxfaWrchw:dsyONZF2GMFkloN3lx36X5Jew
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6a9388e7d70e460e4c4fb99c3a9ffc37.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6a9388e7d70e460e4c4fb99c3a9ffc37.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xtremerat
kaan1993.zapto.org
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_6a9388e7d70e460e4c4fb99c3a9ffc37
-
Size
250KB
-
MD5
6a9388e7d70e460e4c4fb99c3a9ffc37
-
SHA1
71628bd8d8499472ed808a66819d284bf5b8ae49
-
SHA256
3e776d11b420660ffbbe73f18affe85e09c70914dd55b56b8088bf707ba58cbd
-
SHA512
a74cffedf367c28f1f6f5e062d5fdad43b2617c47046f3aa58fb13cbb060ac75c7ee80e2fcc467344d8629676889ebf31587f3077853ea5464ecb6e2aef6e90b
-
SSDEEP
3072:dsyONZz0y6eZkGkBeLkeos8kXV6ndv3lxD7KyALWAHXDpuadxfaWrchw:dsyONZF2GMFkloN3lx36X5Jew
-
Detect XtremeRAT payload
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE
-
Windows security modification
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5