General
-
Target
32702af377f6ee302cb82abf05bcc4bd_JaffaCakes118
-
Size
300KB
-
Sample
241011-ajzljavbla
-
MD5
32702af377f6ee302cb82abf05bcc4bd
-
SHA1
44d30da7c4cdf8d9a4b5685f0a2803d972a017d9
-
SHA256
bd3bbce19f1db201fd0e6b7cd794c4dc349bd66940e3af97344887a7b3fdcf26
-
SHA512
3f60c3ad35a13b2a0579cc73fae2a935ce4af51807b04d3346a8ac18f43d46c63742103e8db0ef0b518609885ba0c75d0fd3ad019f1bef39d645045b50304c3b
-
SSDEEP
3072:c6kPUft0V8epCMEjMzo+vUik0CWYWwX+jBqUze588jMNEN14+E3vfVe/+l:psUftunpKm5IW7TMppz4Dvfw
Static task
static1
Behavioral task
behavioral1
Sample
32702af377f6ee302cb82abf05bcc4bd_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
32702af377f6ee302cb82abf05bcc4bd_JaffaCakes118
-
Size
300KB
-
MD5
32702af377f6ee302cb82abf05bcc4bd
-
SHA1
44d30da7c4cdf8d9a4b5685f0a2803d972a017d9
-
SHA256
bd3bbce19f1db201fd0e6b7cd794c4dc349bd66940e3af97344887a7b3fdcf26
-
SHA512
3f60c3ad35a13b2a0579cc73fae2a935ce4af51807b04d3346a8ac18f43d46c63742103e8db0ef0b518609885ba0c75d0fd3ad019f1bef39d645045b50304c3b
-
SSDEEP
3072:c6kPUft0V8epCMEjMzo+vUik0CWYWwX+jBqUze588jMNEN14+E3vfVe/+l:psUftunpKm5IW7TMppz4Dvfw
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-