General
-
Target
JaffaCakes118_21641456f5ef809c84b3ff74f2d5a03d
-
Size
304KB
-
Sample
250223-tphdzsskfy
-
MD5
21641456f5ef809c84b3ff74f2d5a03d
-
SHA1
bcfc716e8f109727a03fd0e57ffc745a7cceb5ee
-
SHA256
d110aad58c3f1bc9d37b98e4c2d0f908146a796a1f6a3c74b2758d3622ad2d1e
-
SHA512
b9ae592e59d1434decca05358915381cbe7c86548137295639edb66e53174d45237ff41208763dd5d6b29edc50b6695a48c5ebe1fa1c7004c2e871a380a29f12
-
SSDEEP
6144:m5sm5eNZywm2H4/uJ4jUOJ1vwa6lxt2TN2iH04Lra:bmAjy84/uJ4jUAoaK2ZH0n
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_21641456f5ef809c84b3ff74f2d5a03d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_21641456f5ef809c84b3ff74f2d5a03d.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xtremerat
ftita80.no-ip.org
Targets
-
-
Target
JaffaCakes118_21641456f5ef809c84b3ff74f2d5a03d
-
Size
304KB
-
MD5
21641456f5ef809c84b3ff74f2d5a03d
-
SHA1
bcfc716e8f109727a03fd0e57ffc745a7cceb5ee
-
SHA256
d110aad58c3f1bc9d37b98e4c2d0f908146a796a1f6a3c74b2758d3622ad2d1e
-
SHA512
b9ae592e59d1434decca05358915381cbe7c86548137295639edb66e53174d45237ff41208763dd5d6b29edc50b6695a48c5ebe1fa1c7004c2e871a380a29f12
-
SSDEEP
6144:m5sm5eNZywm2H4/uJ4jUOJ1vwa6lxt2TN2iH04Lra:bmAjy84/uJ4jUAoaK2ZH0n
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1