General
-
Target
3fa521e5e581834882e9b4042a5a4cf9_JaffaCakes118
-
Size
126KB
-
Sample
241013-ntyc4szaqj
-
MD5
3fa521e5e581834882e9b4042a5a4cf9
-
SHA1
4f736dff37aa04dff031cadf30e617a9df1c38d5
-
SHA256
6a1555e7cad7a4890402c1fb2c51df8d8cbf6e1812a069fdac742ae20e335e95
-
SHA512
5e43a6e53fe411bc2f5de30c6b878306f914370fe1f28162b68663beb28416ba3471022e9e819fabffa060c64d5d20a828862a8b1435d2940669c175ef5f70cb
-
SSDEEP
3072:TYZoyJ6d1AoZ1f0HDfvkDxacIj1D9JpqHYgPTfSD5NAimiph:0xiZGHbsDI1lcYgPmy
Static task
static1
Behavioral task
behavioral1
Sample
3fa521e5e581834882e9b4042a5a4cf9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3fa521e5e581834882e9b4042a5a4cf9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xtremerat
pokerking.dyndns.biz
Targets
-
-
Target
3fa521e5e581834882e9b4042a5a4cf9_JaffaCakes118
-
Size
126KB
-
MD5
3fa521e5e581834882e9b4042a5a4cf9
-
SHA1
4f736dff37aa04dff031cadf30e617a9df1c38d5
-
SHA256
6a1555e7cad7a4890402c1fb2c51df8d8cbf6e1812a069fdac742ae20e335e95
-
SHA512
5e43a6e53fe411bc2f5de30c6b878306f914370fe1f28162b68663beb28416ba3471022e9e819fabffa060c64d5d20a828862a8b1435d2940669c175ef5f70cb
-
SSDEEP
3072:TYZoyJ6d1AoZ1f0HDfvkDxacIj1D9JpqHYgPTfSD5NAimiph:0xiZGHbsDI1lcYgPmy
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Suspicious use of SetThreadContext
-