General
-
Target
5ce13cf935b88f59ffaf854858e9b55d_JaffaCakes118
-
Size
214KB
-
Sample
241019-qtypzsydjg
-
MD5
5ce13cf935b88f59ffaf854858e9b55d
-
SHA1
af842a04fd799d417c0d5c0ccf90399c06a30614
-
SHA256
ba803ae0bda7b0de5f5e0d8a987e9259bb7d3fd064c90b7dbb88f6b973a6f840
-
SHA512
14907e28f2fd0eafc451bf878022c8afa761b8ffd952dda969bbd87db00ac2f1223cc2a62a978d073f735717525772d88af5e3174313b9a6c14bc2cef27a306b
-
SSDEEP
6144:0aKypn+aCP0vdZhhL0MTd3MyI2JrvCidMa:0alWPCZHBd3MyI29vr
Static task
static1
Behavioral task
behavioral1
Sample
5ce13cf935b88f59ffaf854858e9b55d_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
xtremerat
demone2011.no-ip.org
Targets
-
-
Target
5ce13cf935b88f59ffaf854858e9b55d_JaffaCakes118
-
Size
214KB
-
MD5
5ce13cf935b88f59ffaf854858e9b55d
-
SHA1
af842a04fd799d417c0d5c0ccf90399c06a30614
-
SHA256
ba803ae0bda7b0de5f5e0d8a987e9259bb7d3fd064c90b7dbb88f6b973a6f840
-
SHA512
14907e28f2fd0eafc451bf878022c8afa761b8ffd952dda969bbd87db00ac2f1223cc2a62a978d073f735717525772d88af5e3174313b9a6c14bc2cef27a306b
-
SSDEEP
6144:0aKypn+aCP0vdZhhL0MTd3MyI2JrvCidMa:0alWPCZHBd3MyI29vr
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-