General
-
Target
JaffaCakes118_92463f77f40595d193ec96d7110ca7d9
-
Size
597KB
-
Sample
250204-la8zdstpam
-
MD5
92463f77f40595d193ec96d7110ca7d9
-
SHA1
a1ef00f5635ade5de097373d89710cf00f16bfe3
-
SHA256
3ea0ae2b4f2ef54ec31a155fd20c493ebc6aae640aadf20a2731f50e3e1242f0
-
SHA512
59116d3df98e5ac0aecffc71328cc3d6065bbc193df1fc2555ebcc71783a3cdc16600ef54a6bf6aabcb3de6a230fc592bf302c8a879d817b6a6e3dcc5df7b7a5
-
SSDEEP
12288:WqucHnZrJ2WFtJMOqf2Q1/1MoF5+eh8aWvp2g1iqoY3t+vVLtT/:tr0YtKOqr1i+H6aWvpX3uVLtT/
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_92463f77f40595d193ec96d7110ca7d9.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_92463f77f40595d193ec96d7110ca7d9
-
Size
597KB
-
MD5
92463f77f40595d193ec96d7110ca7d9
-
SHA1
a1ef00f5635ade5de097373d89710cf00f16bfe3
-
SHA256
3ea0ae2b4f2ef54ec31a155fd20c493ebc6aae640aadf20a2731f50e3e1242f0
-
SHA512
59116d3df98e5ac0aecffc71328cc3d6065bbc193df1fc2555ebcc71783a3cdc16600ef54a6bf6aabcb3de6a230fc592bf302c8a879d817b6a6e3dcc5df7b7a5
-
SSDEEP
12288:WqucHnZrJ2WFtJMOqf2Q1/1MoF5+eh8aWvp2g1iqoY3t+vVLtT/:tr0YtKOqr1i+H6aWvpX3uVLtT/
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1