General
-
Target
JaffaCakes118_e8462b7b941cffa789fe7af451c87edd
-
Size
88KB
-
Sample
250211-t5zcfasrbm
-
MD5
e8462b7b941cffa789fe7af451c87edd
-
SHA1
f872312ab04e4a7cbd0c8e7e3c69d235dce6df82
-
SHA256
a22634e1a8707e61606622ee09bbc4e0ae5b2a08c0022a9a04b23d483dc76b7d
-
SHA512
d5b38fc2d62c6f551f3ebe45435f54b2b2514a5e32a37ed9a4e8a673a055c15cac7e8b901b023bb30a6e6dc36ef68b7a65d690330fdd21793d6fdf0524f97958
-
SSDEEP
1536:4u9JHwXIZkCBDAWknAy89JHwXIZkCBD/q3g7NeYRN8K:zCXUkCBDApqCXUkCBD/qieq8K
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e8462b7b941cffa789fe7af451c87edd.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_e8462b7b941cffa789fe7af451c87edd
-
Size
88KB
-
MD5
e8462b7b941cffa789fe7af451c87edd
-
SHA1
f872312ab04e4a7cbd0c8e7e3c69d235dce6df82
-
SHA256
a22634e1a8707e61606622ee09bbc4e0ae5b2a08c0022a9a04b23d483dc76b7d
-
SHA512
d5b38fc2d62c6f551f3ebe45435f54b2b2514a5e32a37ed9a4e8a673a055c15cac7e8b901b023bb30a6e6dc36ef68b7a65d690330fdd21793d6fdf0524f97958
-
SSDEEP
1536:4u9JHwXIZkCBDAWknAy89JHwXIZkCBD/q3g7NeYRN8K:zCXUkCBDApqCXUkCBD/qieq8K
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1