General
-
Target
JaffaCakes118_c5cbe327f87f86b92b574ec9ebc775f0
-
Size
1.1MB
-
Sample
250208-wk6bcsxldx
-
MD5
c5cbe327f87f86b92b574ec9ebc775f0
-
SHA1
da3f4a5039d81ceaeebfead9088bf74496aa307f
-
SHA256
90f90ec0e43c9fff1046584c1b1b7d4095d22d0374ebc387ea6e8b1632afcd3f
-
SHA512
59b02c96fef4f158fdbff04682d6917197e7e7dbc2828f6a69e2bfa1de5e14560acb5b3fa69ef3f8b6c0643e2ca1c22349a8df524db5e37ac77df9687a8a365c
-
SSDEEP
24576:xCnCp7eUQYU5q4Ypnx8DpLjGMCyFLjYGCsYFdnocS:xCnCp7d/bHRSd/pVL0S
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c5cbe327f87f86b92b574ec9ebc775f0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c5cbe327f87f86b92b574ec9ebc775f0.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
xtremerat
umutakcicekk.no-ip.org
-ip.org
Targets
-
-
Target
JaffaCakes118_c5cbe327f87f86b92b574ec9ebc775f0
-
Size
1.1MB
-
MD5
c5cbe327f87f86b92b574ec9ebc775f0
-
SHA1
da3f4a5039d81ceaeebfead9088bf74496aa307f
-
SHA256
90f90ec0e43c9fff1046584c1b1b7d4095d22d0374ebc387ea6e8b1632afcd3f
-
SHA512
59b02c96fef4f158fdbff04682d6917197e7e7dbc2828f6a69e2bfa1de5e14560acb5b3fa69ef3f8b6c0643e2ca1c22349a8df524db5e37ac77df9687a8a365c
-
SSDEEP
24576:xCnCp7eUQYU5q4Ypnx8DpLjGMCyFLjYGCsYFdnocS:xCnCp7d/bHRSd/pVL0S
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1