General
-
Target
667183e49bb02843bca90ee7bcd5c14e_JaffaCakes118
-
Size
205KB
-
Sample
240723-g1t6ps1eqd
-
MD5
667183e49bb02843bca90ee7bcd5c14e
-
SHA1
718adfd26308a2b6afead6c3c879c855bec9a604
-
SHA256
918f7c675332833537436a3bcb58f8e44e6874306d7019fabf0379767527f067
-
SHA512
df821c1344372aa6c516b7c9ade2bade534deee2881c780362a663db09055b48b120c8f503ab2c8db64c79f3de373ac2b0274348b264f5fd45dd7f1f310eff8c
-
SSDEEP
3072:VY9LPZEB0PLiEFpDxjYbpXuOmW0AcHNqXmgd7Ykhu+DqRjO2KOSLgk5yGqO3N:VYVLdTjYleOmb4d7XxqpOeKRqaN
Static task
static1
Behavioral task
behavioral1
Sample
667183e49bb02843bca90ee7bcd5c14e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
667183e49bb02843bca90ee7bcd5c14e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
667183e49bb02843bca90ee7bcd5c14e_JaffaCakes118
-
Size
205KB
-
MD5
667183e49bb02843bca90ee7bcd5c14e
-
SHA1
718adfd26308a2b6afead6c3c879c855bec9a604
-
SHA256
918f7c675332833537436a3bcb58f8e44e6874306d7019fabf0379767527f067
-
SHA512
df821c1344372aa6c516b7c9ade2bade534deee2881c780362a663db09055b48b120c8f503ab2c8db64c79f3de373ac2b0274348b264f5fd45dd7f1f310eff8c
-
SSDEEP
3072:VY9LPZEB0PLiEFpDxjYbpXuOmW0AcHNqXmgd7Ykhu+DqRjO2KOSLgk5yGqO3N:VYVLdTjYleOmb4d7XxqpOeKRqaN
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-