General
-
Target
2fd541cafdee4d46f5a2ec1a051e4645_JaffaCakes118
-
Size
146KB
-
Sample
241009-myzw3awhke
-
MD5
2fd541cafdee4d46f5a2ec1a051e4645
-
SHA1
f08ffac8fb192eeca68826ff94d048ab788a9987
-
SHA256
a769b350f449c9bcaeb5032f03130a914039d7cfd0584534ee15219de1f2e5dc
-
SHA512
94e1e35be08167d3f0dcc1fa439b447a3566d56e0fd641b03abd69ae0172bf301062f18855a8774725e82b085dddd06f1ec45b2b5eae5dbfa2e9f0eb7db4fd39
-
SSDEEP
3072:lpYhsfT+oc0fz8XDPiMqDU6TlenAogbBjW0+qIpgTBUUF:JfTM0faLts5lYAokBjW0+qiy
Static task
static1
Behavioral task
behavioral1
Sample
2fd541cafdee4d46f5a2ec1a051e4645_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
xtremerat
hackermusa.no-ip.org
Targets
-
-
Target
2fd541cafdee4d46f5a2ec1a051e4645_JaffaCakes118
-
Size
146KB
-
MD5
2fd541cafdee4d46f5a2ec1a051e4645
-
SHA1
f08ffac8fb192eeca68826ff94d048ab788a9987
-
SHA256
a769b350f449c9bcaeb5032f03130a914039d7cfd0584534ee15219de1f2e5dc
-
SHA512
94e1e35be08167d3f0dcc1fa439b447a3566d56e0fd641b03abd69ae0172bf301062f18855a8774725e82b085dddd06f1ec45b2b5eae5dbfa2e9f0eb7db4fd39
-
SSDEEP
3072:lpYhsfT+oc0fz8XDPiMqDU6TlenAogbBjW0+qIpgTBUUF:JfTM0faLts5lYAokBjW0+qiy
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Suspicious use of SetThreadContext
-