General
-
Target
44e5e8b3ea5ecc5930212ac64f1e9aeb_JaffaCakes118
-
Size
2.2MB
-
Sample
240515-g9a47ada6w
-
MD5
44e5e8b3ea5ecc5930212ac64f1e9aeb
-
SHA1
3abf6720308c021a11086a9cf1e7a92d5a5c2e5f
-
SHA256
56f9f3dcdedea081034d522496194b1e8d5fc4034dbc07629c1d701a8a98dd9d
-
SHA512
576c94fbbeba6b7d632eec5253f693f282de2ae723f7af78160f2cf80d2757394287457ce518e9addc64f6dbfe4b6b22ecc64bec91c4eaae4f393b6b3c91963b
-
SSDEEP
24576:f+o16BY9cSO93WaGzXN5andSBe3n7W6Z8dfMue7+Y/LQp4E8gqybujugnrrn/5PC:fLk3BBRXV8Opcpl43tmgmu8fGP1oCgqg
Static task
static1
Behavioral task
behavioral1
Sample
44e5e8b3ea5ecc5930212ac64f1e9aeb_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
44e5e8b3ea5ecc5930212ac64f1e9aeb_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xtremerat
nhbwelikky.net
Extracted
lokibot
http://vostokllc.com/js/jquery/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
44e5e8b3ea5ecc5930212ac64f1e9aeb_JaffaCakes118
-
Size
2.2MB
-
MD5
44e5e8b3ea5ecc5930212ac64f1e9aeb
-
SHA1
3abf6720308c021a11086a9cf1e7a92d5a5c2e5f
-
SHA256
56f9f3dcdedea081034d522496194b1e8d5fc4034dbc07629c1d701a8a98dd9d
-
SHA512
576c94fbbeba6b7d632eec5253f693f282de2ae723f7af78160f2cf80d2757394287457ce518e9addc64f6dbfe4b6b22ecc64bec91c4eaae4f393b6b3c91963b
-
SSDEEP
24576:f+o16BY9cSO93WaGzXN5andSBe3n7W6Z8dfMue7+Y/LQp4E8gqybujugnrrn/5PC:fLk3BBRXV8Opcpl43tmgmu8fGP1oCgqg
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-