General
-
Target
JaffaCakes118_907b85ab796fd103ca610f91714e4bad
-
Size
701KB
-
Sample
250204-ge8rzaypaj
-
MD5
907b85ab796fd103ca610f91714e4bad
-
SHA1
3c8e9171f6a14008e141737ddb7120df85c96a6b
-
SHA256
3acdef6b773fcae4790f0f31470f95f15be01b0ee7553c706ca12bb75fc337c1
-
SHA512
ea40248dbc67516cdc8dbb0670879650a8a3afc123525abce1b2aa900687f937110e195ebec7021b8cf7915f153914427f0596cc13921c4183334d34e6875283
-
SSDEEP
12288:chkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aaGFMzw:URmJkcoQricOIQxiZY1iaaGFME
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_907b85ab796fd103ca610f91714e4bad.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_907b85ab796fd103ca610f91714e4bad
-
Size
701KB
-
MD5
907b85ab796fd103ca610f91714e4bad
-
SHA1
3c8e9171f6a14008e141737ddb7120df85c96a6b
-
SHA256
3acdef6b773fcae4790f0f31470f95f15be01b0ee7553c706ca12bb75fc337c1
-
SHA512
ea40248dbc67516cdc8dbb0670879650a8a3afc123525abce1b2aa900687f937110e195ebec7021b8cf7915f153914427f0596cc13921c4183334d34e6875283
-
SSDEEP
12288:chkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aaGFMzw:URmJkcoQricOIQxiZY1iaaGFME
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1