General
-
Target
JaffaCakes118_bd80ee44a3c34a42b4fe8dfd74409ff3
-
Size
769KB
-
Sample
250208-brmglsxpbz
-
MD5
bd80ee44a3c34a42b4fe8dfd74409ff3
-
SHA1
7ce8e6740c89b5d96a239972f1f3f357938280af
-
SHA256
dbb3c718e34685ca9c60855a69b84aa9f54d8179cfa5d2eae17ddb313f7709a0
-
SHA512
538bedfb457912066f848fa75f746148403df9e1eb6ad80b5be110afe5a52a22802f6a83d8d83098293c3a950cbf2b13cac8741a79f38a461d85f966be1163d8
-
SSDEEP
24576:5RmJkcoQricOIQxiZY1iaVYEpcWX9XOHV:WJZoQrbTFZY1iaVKWteHV
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bd80ee44a3c34a42b4fe8dfd74409ff3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bd80ee44a3c34a42b4fe8dfd74409ff3.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
JaffaCakes118_bd80ee44a3c34a42b4fe8dfd74409ff3
-
Size
769KB
-
MD5
bd80ee44a3c34a42b4fe8dfd74409ff3
-
SHA1
7ce8e6740c89b5d96a239972f1f3f357938280af
-
SHA256
dbb3c718e34685ca9c60855a69b84aa9f54d8179cfa5d2eae17ddb313f7709a0
-
SHA512
538bedfb457912066f848fa75f746148403df9e1eb6ad80b5be110afe5a52a22802f6a83d8d83098293c3a950cbf2b13cac8741a79f38a461d85f966be1163d8
-
SSDEEP
24576:5RmJkcoQricOIQxiZY1iaVYEpcWX9XOHV:WJZoQrbTFZY1iaVKWteHV
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Deletes itself
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1