General
-
Target
ace7276b6d15813bed302002d4dee55d_JaffaCakes118
-
Size
3.5MB
-
Sample
240615-e9g7dsshlm
-
MD5
ace7276b6d15813bed302002d4dee55d
-
SHA1
e59ec6b73b699d08cf7ca9fc54ff668c80208f90
-
SHA256
c93d2fbcfa240a73280b3da49ca5cc0bcf6626aa9b6c399cf04d6409725da79f
-
SHA512
8437857b6a3a38afc966ef00e242c2e018f0feac0ef375295ff0f938f1a7ceebb41146858854bb7620230b3a456291a8a9fe91b3d682c949cd5d8279a3ea319a
-
SSDEEP
49152:MFAPGOWtoqVbb33mZHDdh/bW7I/dx5Y6Ug6ukDHvaARtyC553NAgh51i:MFAP/cbbjAj7bW7sdrNUvyARtP55BM
Static task
static1
Behavioral task
behavioral1
Sample
ace7276b6d15813bed302002d4dee55d_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ace7276b6d15813bed302002d4dee55d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
xtremerat
josevaliasacve.sytes.net
Extracted
lokibot
http://cceibnkbenin.com/app/fonts/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
ace7276b6d15813bed302002d4dee55d_JaffaCakes118
-
Size
3.5MB
-
MD5
ace7276b6d15813bed302002d4dee55d
-
SHA1
e59ec6b73b699d08cf7ca9fc54ff668c80208f90
-
SHA256
c93d2fbcfa240a73280b3da49ca5cc0bcf6626aa9b6c399cf04d6409725da79f
-
SHA512
8437857b6a3a38afc966ef00e242c2e018f0feac0ef375295ff0f938f1a7ceebb41146858854bb7620230b3a456291a8a9fe91b3d682c949cd5d8279a3ea319a
-
SSDEEP
49152:MFAPGOWtoqVbb33mZHDdh/bW7I/dx5Y6Ug6ukDHvaARtyC553NAgh51i:MFAP/cbbjAj7bW7sdrNUvyARtP55BM
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-