General
-
Target
2bf9dfb6f7db5495cd6866c5ac7233e6_JaffaCakes118
-
Size
81KB
-
Sample
241009-gjrn9ayglf
-
MD5
2bf9dfb6f7db5495cd6866c5ac7233e6
-
SHA1
7ae992dfa6b3d362f244897c4b6c2b1c3bcbab5c
-
SHA256
be292baeb8b434a7bcc2506ba3587b21bc2258d4de2c29d9e4494aba5c7bfdc4
-
SHA512
3b88d4de7b625884fad880971e256ed99b4767fcdfd9eea648144c7e57ab2d9610747b6682c4fa5e8b77d4570290b4953a94b76984b4963251c52888204676e2
-
SSDEEP
1536:0G2EnTramCVTJ10e9yhVuFTE11sb/MG5Eq9fCSxbtnkc6C:0ynvBCVTJ10ey0mTszhxbtnk3C
Static task
static1
Behavioral task
behavioral1
Sample
2bf9dfb6f7db5495cd6866c5ac7233e6_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2bf9dfb6f7db5495cd6866c5ac7233e6_JaffaCakes118
-
Size
81KB
-
MD5
2bf9dfb6f7db5495cd6866c5ac7233e6
-
SHA1
7ae992dfa6b3d362f244897c4b6c2b1c3bcbab5c
-
SHA256
be292baeb8b434a7bcc2506ba3587b21bc2258d4de2c29d9e4494aba5c7bfdc4
-
SHA512
3b88d4de7b625884fad880971e256ed99b4767fcdfd9eea648144c7e57ab2d9610747b6682c4fa5e8b77d4570290b4953a94b76984b4963251c52888204676e2
-
SSDEEP
1536:0G2EnTramCVTJ10e9yhVuFTE11sb/MG5Eq9fCSxbtnkc6C:0ynvBCVTJ10ey0mTszhxbtnk3C
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Suspicious use of SetThreadContext
-