General
-
Target
834ee177dccb90d586156e4a1596d9e0_JaffaCakes118
-
Size
612KB
-
Sample
240802-gvhwgsvcmg
-
MD5
834ee177dccb90d586156e4a1596d9e0
-
SHA1
a35079e5ccec35cde48a895c10512e26d68138f1
-
SHA256
af32e7d59c778815276e7ca32535fe9048c80596d59d844876c58a455d9491d8
-
SHA512
47f435159a706cfc132a656d61a920ee385cede15bc2ec27b58032f653567555558daed641cdc15b666e30585e3c915d0506783d2bc43bc4798f9984d9cf17e2
-
SSDEEP
12288:aaoqwuhLcuEQhxkkGsLX4UkaUp77xCgp1spuQuQxOMTMUoAj65+q0jj:aaojuhLcuESLjk7PxT3ZXYMtAs8j
Static task
static1
Behavioral task
behavioral1
Sample
834ee177dccb90d586156e4a1596d9e0_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
834ee177dccb90d586156e4a1596d9e0_JaffaCakes118
-
Size
612KB
-
MD5
834ee177dccb90d586156e4a1596d9e0
-
SHA1
a35079e5ccec35cde48a895c10512e26d68138f1
-
SHA256
af32e7d59c778815276e7ca32535fe9048c80596d59d844876c58a455d9491d8
-
SHA512
47f435159a706cfc132a656d61a920ee385cede15bc2ec27b58032f653567555558daed641cdc15b666e30585e3c915d0506783d2bc43bc4798f9984d9cf17e2
-
SSDEEP
12288:aaoqwuhLcuEQhxkkGsLX4UkaUp77xCgp1spuQuQxOMTMUoAj65+q0jj:aaojuhLcuESLjk7PxT3ZXYMtAs8j
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of SetThreadContext
-