General
-
Target
3aa8d8eb5f79aae5b1c7e4e215913178_JaffaCakes118
-
Size
95KB
-
Sample
241012-sffcla1cjp
-
MD5
3aa8d8eb5f79aae5b1c7e4e215913178
-
SHA1
3a47f629d4e41ca7b1674ef25031e4dfe4a927fd
-
SHA256
f221cde9e2ef3b5e5d72accec6f2ea46676fea68058077b366eaff22e3d01b2b
-
SHA512
a71d52c5219341d33829772b65fde65cef66001b9cb6587a97a0775ebabb1d47a2d2947cf1cb253ad943be7fadcceaac88da896127251d0785d0f6aa70f5e3a9
-
SSDEEP
1536:HP6WyHRjb4S1tCoIFD/Ffi8tLoWSJdWMwDTFa:v+HIbfxtiJdTwDTc
Static task
static1
Behavioral task
behavioral1
Sample
3aa8d8eb5f79aae5b1c7e4e215913178_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
xtremerat
hoplit.no-ip.org
Targets
-
-
Target
3aa8d8eb5f79aae5b1c7e4e215913178_JaffaCakes118
-
Size
95KB
-
MD5
3aa8d8eb5f79aae5b1c7e4e215913178
-
SHA1
3a47f629d4e41ca7b1674ef25031e4dfe4a927fd
-
SHA256
f221cde9e2ef3b5e5d72accec6f2ea46676fea68058077b366eaff22e3d01b2b
-
SHA512
a71d52c5219341d33829772b65fde65cef66001b9cb6587a97a0775ebabb1d47a2d2947cf1cb253ad943be7fadcceaac88da896127251d0785d0f6aa70f5e3a9
-
SSDEEP
1536:HP6WyHRjb4S1tCoIFD/Ffi8tLoWSJdWMwDTFa:v+HIbfxtiJdTwDTc
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Suspicious use of SetThreadContext
-