General
-
Target
7701edc1146647bfa3adc72e1263fc14_JaffaCakes118
-
Size
605KB
-
Sample
240727-es57wszclf
-
MD5
7701edc1146647bfa3adc72e1263fc14
-
SHA1
73556b0d6578fb3341e4a5d8d6598d92cad96ba9
-
SHA256
4f0f9ae838d580d2d59469980c33d1bdb35b3592db87079d8c860f86a3a8cd65
-
SHA512
90acc4bf42562baa816fe9f006758a2268fb4dec925168e374a29496db1e56d3b0d0994e0acfb2fa14bc7c8f87c6532048421b9c255108dd840963055e82ebd3
-
SSDEEP
12288:77MJe4vdTfCsrX8Cwt74khOUbKObQ3IhW4ulrVOyQ:77M/lfCMX85tXDHh6Q
Static task
static1
Behavioral task
behavioral1
Sample
7701edc1146647bfa3adc72e1263fc14_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7701edc1146647bfa3adc72e1263fc14_JaffaCakes118.exe
Resource
win10v2004-20240729-en
Malware Config
Targets
-
-
Target
7701edc1146647bfa3adc72e1263fc14_JaffaCakes118
-
Size
605KB
-
MD5
7701edc1146647bfa3adc72e1263fc14
-
SHA1
73556b0d6578fb3341e4a5d8d6598d92cad96ba9
-
SHA256
4f0f9ae838d580d2d59469980c33d1bdb35b3592db87079d8c860f86a3a8cd65
-
SHA512
90acc4bf42562baa816fe9f006758a2268fb4dec925168e374a29496db1e56d3b0d0994e0acfb2fa14bc7c8f87c6532048421b9c255108dd840963055e82ebd3
-
SSDEEP
12288:77MJe4vdTfCsrX8Cwt74khOUbKObQ3IhW4ulrVOyQ:77M/lfCMX85tXDHh6Q
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-