General
-
Target
JaffaCakes118_c200a046fd4b5e858f71173bc992c400
-
Size
372KB
-
Sample
250208-mcvefsyqdz
-
MD5
c200a046fd4b5e858f71173bc992c400
-
SHA1
d9c019b9ea5fe8d25f696d759bcbae1ab57b28d7
-
SHA256
e3a9e90308d7a12bd83ad8d85b746500db04887adc6d1cab0223592ca7a53503
-
SHA512
63c75179ebe46635a9753695375ebd53d4c84faaa11d6e8bc23af60554ccec4e2d9673d761f313990b73989056dc9b95aca30160c4faa3925c6ce8c6cd0ad381
-
SSDEEP
6144:rPwurnUZkJGPJxkOCW/CW68QD1Qeme0039q2tIA2ueDf:AxxkVGej91ejDf
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c200a046fd4b5e858f71173bc992c400.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c200a046fd4b5e858f71173bc992c400.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
JaffaCakes118_c200a046fd4b5e858f71173bc992c400
-
Size
372KB
-
MD5
c200a046fd4b5e858f71173bc992c400
-
SHA1
d9c019b9ea5fe8d25f696d759bcbae1ab57b28d7
-
SHA256
e3a9e90308d7a12bd83ad8d85b746500db04887adc6d1cab0223592ca7a53503
-
SHA512
63c75179ebe46635a9753695375ebd53d4c84faaa11d6e8bc23af60554ccec4e2d9673d761f313990b73989056dc9b95aca30160c4faa3925c6ce8c6cd0ad381
-
SSDEEP
6144:rPwurnUZkJGPJxkOCW/CW68QD1Qeme0039q2tIA2ueDf:AxxkVGej91ejDf
-
Detect XtremeRAT payload
-
Modifies firewall policy service
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Pre-OS Boot
1Bootkit
1