General
-
Target
20bdf082026a74f1f31a5b1c12fd6763_JaffaCakes118
-
Size
272KB
-
Sample
241008-k53kessenc
-
MD5
20bdf082026a74f1f31a5b1c12fd6763
-
SHA1
4295e87724307cb40fdb1acc0471e7bfcf35cfd9
-
SHA256
b76af5ae5caf68b5afd1f4bd5ef54b23c833960d5ce5b3f00ee66ab4b9996849
-
SHA512
242a2913168495a3c9c3f4f5a8aa8a50217aa8351c14c8ca8052641b10252ee3e8be6cfc6e0a981e093cb6a1cea7ec718cb7192889caf266995e54f0fc13c1f7
-
SSDEEP
3072:Uzjx6rrzaLlQsPNxffh0X27HYpN4PFX1EQ80jPvidNfDN:6k27HYf4PDs0jPvidN
Static task
static1
Behavioral task
behavioral1
Sample
20bdf082026a74f1f31a5b1c12fd6763_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
ssaaiq.no-ip.org
Targets
-
-
Target
20bdf082026a74f1f31a5b1c12fd6763_JaffaCakes118
-
Size
272KB
-
MD5
20bdf082026a74f1f31a5b1c12fd6763
-
SHA1
4295e87724307cb40fdb1acc0471e7bfcf35cfd9
-
SHA256
b76af5ae5caf68b5afd1f4bd5ef54b23c833960d5ce5b3f00ee66ab4b9996849
-
SHA512
242a2913168495a3c9c3f4f5a8aa8a50217aa8351c14c8ca8052641b10252ee3e8be6cfc6e0a981e093cb6a1cea7ec718cb7192889caf266995e54f0fc13c1f7
-
SSDEEP
3072:Uzjx6rrzaLlQsPNxffh0X27HYpN4PFX1EQ80jPvidNfDN:6k27HYf4PDs0jPvidN
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Suspicious use of SetThreadContext
-