General
-
Target
JaffaCakes118_a9afaccff1f8f3cf7f1d2cbdb7439b88
-
Size
20KB
-
Sample
250206-lg6gva1jbw
-
MD5
a9afaccff1f8f3cf7f1d2cbdb7439b88
-
SHA1
8f91cd6b162adbec206d1449792cb1a4f1a55a24
-
SHA256
04cadae437eeeac2971af08603a558ba61a63003c400bbd6dd725ad737890166
-
SHA512
240acf93f749b0147a49fc14cf7d996747975e8c2400db109937dc636aa82f7c9baacb79063b637f75f17ee4196078ce532329272b373c5fc67354ba293aa9e4
-
SSDEEP
384:JnD2eetIgFttzfA8WFRGlm/L5wp2ZDvDqVJMoz7x4wxJDNguLR:52PtxFt9m7GSL5UVJtz7xBJDNF
Behavioral task
behavioral1
Sample
JaffaCakes118_a9afaccff1f8f3cf7f1d2cbdb7439b88.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_a9afaccff1f8f3cf7f1d2cbdb7439b88
-
Size
20KB
-
MD5
a9afaccff1f8f3cf7f1d2cbdb7439b88
-
SHA1
8f91cd6b162adbec206d1449792cb1a4f1a55a24
-
SHA256
04cadae437eeeac2971af08603a558ba61a63003c400bbd6dd725ad737890166
-
SHA512
240acf93f749b0147a49fc14cf7d996747975e8c2400db109937dc636aa82f7c9baacb79063b637f75f17ee4196078ce532329272b373c5fc67354ba293aa9e4
-
SSDEEP
384:JnD2eetIgFttzfA8WFRGlm/L5wp2ZDvDqVJMoz7x4wxJDNguLR:52PtxFt9m7GSL5UVJtz7xBJDNF
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1