General
-
Target
8d57ce26e6d6ab8fad9ae820ee67320e_JaffaCakes118
-
Size
169KB
-
Sample
241103-y7h6fsspc1
-
MD5
8d57ce26e6d6ab8fad9ae820ee67320e
-
SHA1
ff4455a7755a774f10f7b8faffdc96cbda25892b
-
SHA256
85e281dcd525a84a1eac213e32c7e11eeb17df1a989bc233587c8615e698ba8d
-
SHA512
57e5d141a93c4fb91acad7781df9ccc4ae463d7c2efa893d45e1a75cf0e3d53f0ece080962dc657a0b5d254c4568e17db8762c2c3b5c0a07a591d13a18583e78
-
SSDEEP
3072:OyJjRGylT8LXyms1V9tkU24qVcDWC96xZrCKiBmz8UZbzbFFFm:OydRGyn1RkU6VcDZIxZK88UNzbn
Static task
static1
Behavioral task
behavioral1
Sample
8d57ce26e6d6ab8fad9ae820ee67320e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8d57ce26e6d6ab8fad9ae820ee67320e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8d57ce26e6d6ab8fad9ae820ee67320e_JaffaCakes118
-
Size
169KB
-
MD5
8d57ce26e6d6ab8fad9ae820ee67320e
-
SHA1
ff4455a7755a774f10f7b8faffdc96cbda25892b
-
SHA256
85e281dcd525a84a1eac213e32c7e11eeb17df1a989bc233587c8615e698ba8d
-
SHA512
57e5d141a93c4fb91acad7781df9ccc4ae463d7c2efa893d45e1a75cf0e3d53f0ece080962dc657a0b5d254c4568e17db8762c2c3b5c0a07a591d13a18583e78
-
SSDEEP
3072:OyJjRGylT8LXyms1V9tkU24qVcDWC96xZrCKiBmz8UZbzbFFFm:OydRGyn1RkU6VcDZIxZK88UNzbn
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext
-