General
-
Target
160c91accd909de4a3a96d6b23bf3528_JaffaCakes118
-
Size
92KB
-
Sample
241005-ed8z8stfjl
-
MD5
160c91accd909de4a3a96d6b23bf3528
-
SHA1
31314e319c34e4db29632f81d6908e8713549a43
-
SHA256
8d42e581b2cb71c69985020506b79434f58bebb43759e2cf2693ef9f47364ace
-
SHA512
4f6048f8f34f1c9968010b5c7dd88df46c0a1b39595ddf756169e5472061e6a25dec0aef2cc9a5b8706c86cfe22d0db6cd85ec98f5906bfcb0ad2a611bad1599
-
SSDEEP
1536:prPsJQ0JRYWTW1kPCwDylaP5f6Ccd3jj9Gq+26sdsUQ1iY0eHP/:VD0JRYWiqPZfP5Edzj97+26nUpTCH
Static task
static1
Behavioral task
behavioral1
Sample
160c91accd909de4a3a96d6b23bf3528_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
benzouine.no-ip.biz
Targets
-
-
Target
160c91accd909de4a3a96d6b23bf3528_JaffaCakes118
-
Size
92KB
-
MD5
160c91accd909de4a3a96d6b23bf3528
-
SHA1
31314e319c34e4db29632f81d6908e8713549a43
-
SHA256
8d42e581b2cb71c69985020506b79434f58bebb43759e2cf2693ef9f47364ace
-
SHA512
4f6048f8f34f1c9968010b5c7dd88df46c0a1b39595ddf756169e5472061e6a25dec0aef2cc9a5b8706c86cfe22d0db6cd85ec98f5906bfcb0ad2a611bad1599
-
SSDEEP
1536:prPsJQ0JRYWTW1kPCwDylaP5f6Ccd3jj9Gq+26sdsUQ1iY0eHP/:VD0JRYWiqPZfP5Edzj97+26nUpTCH
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-