General
-
Target
JaffaCakes118_7d647e36362b646d5c64e233763472ec
-
Size
180KB
-
Sample
250202-qz519awmcl
-
MD5
7d647e36362b646d5c64e233763472ec
-
SHA1
59b6ef9d613d05165c78ccc92b7ea5b1a5736326
-
SHA256
00a32d7711e2ab033ef0ce78f07546d03ed2617fa7d351fc1feb3588ad67d53f
-
SHA512
de4686bcec2b8468c9317a7daa7c9cc822f938160daf016d5cf9e42cf8e273371c999bf1f65923015865057d73a8f10ac70022f6672086bd2d666059e7f5ea7e
-
SSDEEP
3072:gdew+yMRNdew+yMRdZ/9EWr+hSDtsvxz8WAay2u4KXqfT:rsFKthSDtexz8WAay2Eq
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7d647e36362b646d5c64e233763472ec.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_7d647e36362b646d5c64e233763472ec
-
Size
180KB
-
MD5
7d647e36362b646d5c64e233763472ec
-
SHA1
59b6ef9d613d05165c78ccc92b7ea5b1a5736326
-
SHA256
00a32d7711e2ab033ef0ce78f07546d03ed2617fa7d351fc1feb3588ad67d53f
-
SHA512
de4686bcec2b8468c9317a7daa7c9cc822f938160daf016d5cf9e42cf8e273371c999bf1f65923015865057d73a8f10ac70022f6672086bd2d666059e7f5ea7e
-
SSDEEP
3072:gdew+yMRNdew+yMRdZ/9EWr+hSDtsvxz8WAay2u4KXqfT:rsFKthSDtexz8WAay2Eq
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1