General
-
Target
a74c656d1c716b692eec83cb56e5c4cf_JaffaCakes118
-
Size
644KB
-
Sample
241127-l4wk6aypfy
-
MD5
a74c656d1c716b692eec83cb56e5c4cf
-
SHA1
63cb55268b9a7e9ed2a709958e7b2428417e4075
-
SHA256
3b3ada4812ca591b4d87b4acb4a8cae43250cca8fdab12c8f2f38da0357a96c0
-
SHA512
a2c951669a2882825e0f0e88a36e59cf3c37399d0b8eda3dbb86264b2a68472541de8eee97dd23d56bb5993502f01d81ccf35c3cd57e747a6d743bc4ac6352a6
-
SSDEEP
12288:wiqEYyEuCehVyDYPPiL2FkcRd1tGdQQXrUDSeQQd9oGLRwmUwTdqDP:wvh/9klHiSFnRdP3QYSel9Z+mUwQP
Static task
static1
Behavioral task
behavioral1
Sample
a74c656d1c716b692eec83cb56e5c4cf_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a74c656d1c716b692eec83cb56e5c4cf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xtremerat
franciscoldb.no-ip.org
Targets
-
-
Target
a74c656d1c716b692eec83cb56e5c4cf_JaffaCakes118
-
Size
644KB
-
MD5
a74c656d1c716b692eec83cb56e5c4cf
-
SHA1
63cb55268b9a7e9ed2a709958e7b2428417e4075
-
SHA256
3b3ada4812ca591b4d87b4acb4a8cae43250cca8fdab12c8f2f38da0357a96c0
-
SHA512
a2c951669a2882825e0f0e88a36e59cf3c37399d0b8eda3dbb86264b2a68472541de8eee97dd23d56bb5993502f01d81ccf35c3cd57e747a6d743bc4ac6352a6
-
SSDEEP
12288:wiqEYyEuCehVyDYPPiL2FkcRd1tGdQQXrUDSeQQd9oGLRwmUwTdqDP:wvh/9klHiSFnRdP3QYSel9Z+mUwQP
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-