General
-
Target
JaffaCakes118_f7e7c262b546b461a81763bc3831d0d9
-
Size
805KB
-
Sample
250214-pvsppawmhk
-
MD5
f7e7c262b546b461a81763bc3831d0d9
-
SHA1
73456616c3f3c659ef7111666ffcb522390f4804
-
SHA256
87bb4d108c420873c15e7d87d22182b2764f7a9be78cf40d2ab9af8e59645f62
-
SHA512
9142974838ece6c105923387133c31ea75ddebe7efe8a01e281e67626ea2e43523f744020887412cf030798c98a563e41d86c54d5aab965aed43daeaf4ce4777
-
SSDEEP
12288:z8FNK/GdSDaqFmadIg4KaoSLBBjjP0MccUXUs2HFs7sIgn585n7i:YFvca8wg4XHPzccAN2HFsoIgiG
Behavioral task
behavioral1
Sample
JaffaCakes118_f7e7c262b546b461a81763bc3831d0d9.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
nerozhack.ddns.com.br
alonedevil.no-ip.org
gameszero.dyndns.org
Targets
-
-
Target
JaffaCakes118_f7e7c262b546b461a81763bc3831d0d9
-
Size
805KB
-
MD5
f7e7c262b546b461a81763bc3831d0d9
-
SHA1
73456616c3f3c659ef7111666ffcb522390f4804
-
SHA256
87bb4d108c420873c15e7d87d22182b2764f7a9be78cf40d2ab9af8e59645f62
-
SHA512
9142974838ece6c105923387133c31ea75ddebe7efe8a01e281e67626ea2e43523f744020887412cf030798c98a563e41d86c54d5aab965aed43daeaf4ce4777
-
SSDEEP
12288:z8FNK/GdSDaqFmadIg4KaoSLBBjjP0MccUXUs2HFs7sIgn585n7i:YFvca8wg4XHPzccAN2HFsoIgiG
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1