Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
JaffaCakes118_86514df66b0c23d76eef36239f417d84
-
Size
204KB
-
Sample
250322-qxyjdstvh1
-
MD5
86514df66b0c23d76eef36239f417d84
-
SHA1
7d6a723931a7c3f584483f887ab79de1effe867a
-
SHA256
b19f338f30463d4d499d55f5eb6002927a3e8b14ed696ceb38307a0ab1514876
-
SHA512
fd259c6b4247e31a03148247985496d6199d4ecb06be8463a02f64306ba6ab9e5384e86822beb3040a9293d208b5a167c3ca47274276867627a82c8e234f416e
-
SSDEEP
6144:Q2o/Hy6GcOZnhJDarxVDcYQhLdgwrr8CA2:Q2e6cgfD0LDcYi2wrVA2
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_86514df66b0c23d76eef36239f417d84.exe
Resource
win7-20250207-en
Malware Config
Extracted
xtremerat
hbooob.no-ip.biz
Targets
-
-
Target
JaffaCakes118_86514df66b0c23d76eef36239f417d84
-
Size
204KB
-
MD5
86514df66b0c23d76eef36239f417d84
-
SHA1
7d6a723931a7c3f584483f887ab79de1effe867a
-
SHA256
b19f338f30463d4d499d55f5eb6002927a3e8b14ed696ceb38307a0ab1514876
-
SHA512
fd259c6b4247e31a03148247985496d6199d4ecb06be8463a02f64306ba6ab9e5384e86822beb3040a9293d208b5a167c3ca47274276867627a82c8e234f416e
-
SSDEEP
6144:Q2o/Hy6GcOZnhJDarxVDcYQhLdgwrr8CA2:Q2e6cgfD0LDcYi2wrVA2
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1