General
-
Target
JaffaCakes118_eb31879ac63a3dc0144f9dc39249604c
-
Size
316KB
-
Sample
250211-3ng69svkbq
-
MD5
eb31879ac63a3dc0144f9dc39249604c
-
SHA1
55a18ae6ecfe0712c28358cd1e0da4f73f5e4b70
-
SHA256
4fba0fc853adba3582d93668c1b2c3ad866a6f3e71a8b21959ab3ea0a6b25754
-
SHA512
586976b740370348dc6fc7543a300505d672e14e3b01ec84f91cfe9aab377841e4ae50350c88e07ab27a3bd0fa355c5ecdd5df7bf7e1e79508594c52c7e34c5a
-
SSDEEP
6144:8/0uozFBzSG3w8biEJxIB/YrEamFTJZhLPdVEveT4Kpa7:8JoFBzxw0ijSEldZxdWve0ea7
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_eb31879ac63a3dc0144f9dc39249604c.exe
Resource
win7-20250207-en
Malware Config
Extracted
xtremerat
elamr.no-ip.org
Targets
-
-
Target
JaffaCakes118_eb31879ac63a3dc0144f9dc39249604c
-
Size
316KB
-
MD5
eb31879ac63a3dc0144f9dc39249604c
-
SHA1
55a18ae6ecfe0712c28358cd1e0da4f73f5e4b70
-
SHA256
4fba0fc853adba3582d93668c1b2c3ad866a6f3e71a8b21959ab3ea0a6b25754
-
SHA512
586976b740370348dc6fc7543a300505d672e14e3b01ec84f91cfe9aab377841e4ae50350c88e07ab27a3bd0fa355c5ecdd5df7bf7e1e79508594c52c7e34c5a
-
SSDEEP
6144:8/0uozFBzSG3w8biEJxIB/YrEamFTJZhLPdVEveT4Kpa7:8JoFBzxw0ijSEldZxdWve0ea7
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1