General
-
Target
JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce
-
Size
648KB
-
Sample
250211-qrlbwatpat
-
MD5
e6cd7bdd24c526d3733386d487c719ce
-
SHA1
0c8db99f96c22049315fed06c04157bd27da0fda
-
SHA256
e3705d92d0e12299d80c9fab89aee41514cea272865f72bacf1512b9f3b3f8b3
-
SHA512
8c4b8e182b6caead03e1e70313650b605dbdb3bce52ddacd9d492676d618e5f1a72793b132771443393456b923f427ad5c23e33b3559757dd6bd25654caab68e
-
SSDEEP
12288:cMJfF0jXXTSPr+NYh2YENE/Qh6FkaMPWw5FisXolO:hF0jXOVtQoF+PnFis5
Behavioral task
behavioral1
Sample
JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce
-
Size
648KB
-
MD5
e6cd7bdd24c526d3733386d487c719ce
-
SHA1
0c8db99f96c22049315fed06c04157bd27da0fda
-
SHA256
e3705d92d0e12299d80c9fab89aee41514cea272865f72bacf1512b9f3b3f8b3
-
SHA512
8c4b8e182b6caead03e1e70313650b605dbdb3bce52ddacd9d492676d618e5f1a72793b132771443393456b923f427ad5c23e33b3559757dd6bd25654caab68e
-
SSDEEP
12288:cMJfF0jXXTSPr+NYh2YENE/Qh6FkaMPWw5FisXolO:hF0jXOVtQoF+PnFis5
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1