General
-
Target
9400d1ebcbf44687c8a5347e0f8a382f_JaffaCakes118
-
Size
110KB
-
Sample
241124-l8j3xsvmd1
-
MD5
9400d1ebcbf44687c8a5347e0f8a382f
-
SHA1
582b4fd345df8bd0cdc2b83c5fa71ed3854ef07a
-
SHA256
2030b7f91cbb02b5ee21bc563673593f8880f84a0b4e04296e95d4fdca2b777c
-
SHA512
d2a383932d18ebab604d511fc12c76989370b94f536020b84e4f91ab5eb6b6cd969d98fc96f58c059aeb9143b28045542abc62b9b685364fe9bd52b74038c054
-
SSDEEP
3072:8dvVjqqdqqqLJqMPaZ0JKYws5hPSMNWrw7JfPZF7e+U9Fn:8dvVjqqdqqqLJqkdh/YrorK+U
Static task
static1
Behavioral task
behavioral1
Sample
9400d1ebcbf44687c8a5347e0f8a382f_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
xtremerat
mimmo86.no-ip.org
Targets
-
-
Target
9400d1ebcbf44687c8a5347e0f8a382f_JaffaCakes118
-
Size
110KB
-
MD5
9400d1ebcbf44687c8a5347e0f8a382f
-
SHA1
582b4fd345df8bd0cdc2b83c5fa71ed3854ef07a
-
SHA256
2030b7f91cbb02b5ee21bc563673593f8880f84a0b4e04296e95d4fdca2b777c
-
SHA512
d2a383932d18ebab604d511fc12c76989370b94f536020b84e4f91ab5eb6b6cd969d98fc96f58c059aeb9143b28045542abc62b9b685364fe9bd52b74038c054
-
SSDEEP
3072:8dvVjqqdqqqLJqMPaZ0JKYws5hPSMNWrw7JfPZF7e+U9Fn:8dvVjqqdqqqLJqkdh/YrorK+U
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext
-