General
-
Target
c9374c394596b7b214b8008ea8b72934_JaffaCakes118
-
Size
1.0MB
-
Sample
240829-t9n29stcjr
-
MD5
c9374c394596b7b214b8008ea8b72934
-
SHA1
e8de52dce3676598d6b8d01aff1c51fb64a634a0
-
SHA256
b468b9a17083e273b8a7423f3954fab44c2979227ddb5c232b12a243135958de
-
SHA512
cad54aa270b8377acc88dcf1c0f5c5887f0bb84c6391833a381443ec77f82080a9702ae39e3b2af2ed64a5369a060d4aaacd204f282ad1df81b0f095ae4161a0
-
SSDEEP
12288:JaLNn0idiEDCOb5klzPYbT9laDWU9lmoXcQLG1KcKDT+A/ixV:JaLiidiEDr6JlGQagZ
Behavioral task
behavioral1
Sample
c9374c394596b7b214b8008ea8b72934_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
xtremerat
Ÿ钝㱹잻࢘㝥䘚匑麞눰눏홓襬킆얠葎䊡ꟙꖔउ饑쨢嶏䗙邡⇬챛蹻矧硫鳧�뫵�糧stabilhayko.no-ip.org
Targets
-
-
Target
c9374c394596b7b214b8008ea8b72934_JaffaCakes118
-
Size
1.0MB
-
MD5
c9374c394596b7b214b8008ea8b72934
-
SHA1
e8de52dce3676598d6b8d01aff1c51fb64a634a0
-
SHA256
b468b9a17083e273b8a7423f3954fab44c2979227ddb5c232b12a243135958de
-
SHA512
cad54aa270b8377acc88dcf1c0f5c5887f0bb84c6391833a381443ec77f82080a9702ae39e3b2af2ed64a5369a060d4aaacd204f282ad1df81b0f095ae4161a0
-
SSDEEP
12288:JaLNn0idiEDCOb5klzPYbT9laDWU9lmoXcQLG1KcKDT+A/ixV:JaLiidiEDr6JlGQagZ
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-