General
-
Target
2d7839f3fc66dceee05dd4da03474675_JaffaCakes118
-
Size
585KB
-
Sample
240708-xnqwhswdqh
-
MD5
2d7839f3fc66dceee05dd4da03474675
-
SHA1
a831c9b8b6d33f19cd77acfedc4bd2a55989139b
-
SHA256
e8162f1766459e6ef57b0063938da6cab886743ee5c5669233424855c8098f8f
-
SHA512
54d64c6f6785589074b235cb06d0f80288b7e6937c2e161f7a8239686f9f3b0dc9ea237912b6f47647541cfe08bb4e552ba8810d3c0ae965e95951a9300417d3
-
SSDEEP
6144:6aKMSD4Yuaezwp0yN90QEwuzJq/fdlGFlxhlXmEjycLT:jK3D4laoy90lefdcFlxTXmEjBL
Static task
static1
Behavioral task
behavioral1
Sample
2d7839f3fc66dceee05dd4da03474675_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d7839f3fc66dceee05dd4da03474675_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
xtremerat
server1231.no-ip.info
Targets
-
-
Target
2d7839f3fc66dceee05dd4da03474675_JaffaCakes118
-
Size
585KB
-
MD5
2d7839f3fc66dceee05dd4da03474675
-
SHA1
a831c9b8b6d33f19cd77acfedc4bd2a55989139b
-
SHA256
e8162f1766459e6ef57b0063938da6cab886743ee5c5669233424855c8098f8f
-
SHA512
54d64c6f6785589074b235cb06d0f80288b7e6937c2e161f7a8239686f9f3b0dc9ea237912b6f47647541cfe08bb4e552ba8810d3c0ae965e95951a9300417d3
-
SSDEEP
6144:6aKMSD4Yuaezwp0yN90QEwuzJq/fdlGFlxhlXmEjycLT:jK3D4laoy90lefdcFlxTXmEjBL
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-