General
-
Target
4270d63cbc42a090f6b2129b16ae00c2_JaffaCakes118
-
Size
469KB
-
Sample
240514-wt3xlaaa85
-
MD5
4270d63cbc42a090f6b2129b16ae00c2
-
SHA1
1f7c0b59e9430b052e2cfd892236e7fc7f669190
-
SHA256
c5f915bce4baabc66f1a79fd321ea84d22c8abeb8319f20d7ba38860064b9bd9
-
SHA512
7cefcd2b89ba573456b13297510b1ba960a45da2b43c675a92dc89191e9e9ca3ceb30ad9c67a4eef335b9bf888ab82468baddce34b8d447526670e4a6e9a083a
-
SSDEEP
12288:OsxKdJPsDfsTC8GdOs52XCsfEVzJADW1FtvwMzcw/CsC:Osc6LTkBXCRzJIW1FtYMzhC
Static task
static1
Behavioral task
behavioral1
Sample
TRANSACION EXITOSA REALIZADA DETALLE DE PAGO -12321-432-5432-IMG5432jhgf5432.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
TRANSACION EXITOSA REALIZADA DETALLE DE PAGO -12321-432-5432-IMG5432jhgf5432.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xtremerat
rfefef.duckdns.org
Targets
-
-
Target
TRANSACION EXITOSA REALIZADA DETALLE DE PAGO -12321-432-5432-IMG5432jhgf5432.exe
-
Size
1.1MB
-
MD5
0394db81257ce589a1019605c93cdf80
-
SHA1
7dbd22f4a77a1570c323c1954bbeea71a1da225c
-
SHA256
0e6464c8f4b60eff44a75b6c5f74efe1fa607fbd267d3ea80442f95f33625407
-
SHA512
a17131611bf238b060383cff1760797f2144064de0ec98976579190f95bcc8717bb69657b0229a2150f81fbad6c0825f89c9c2cd9dd6e995fa7d7d44298cb5c6
-
SSDEEP
12288:Otb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaJjOLyOJSpq6A:Otb20pkaCqT5TBWgNQ7aZOXYpq6A
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry
-
Drops startup file
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-