General
-
Target
ab736a636c06971e2d605a7b5788a7c7_JaffaCakes118
-
Size
75KB
-
Sample
241128-h3gttswlcj
-
MD5
ab736a636c06971e2d605a7b5788a7c7
-
SHA1
45c5f2bf22151a8cdfc58593d559dffbc3b9e14f
-
SHA256
4e46dcb5edc79a4132579e1b1cc3e9c361cee08f546e6722dd3c69a2d7caef6f
-
SHA512
dbfceaf2b75866f3f9798e4d25f43b43f1f3f5164c83bdb6c9daf5e07be1355dc8b3069198c6d13b39a2191be95ca178f4bfad76021828642ef0ca7131b12678
-
SSDEEP
1536:upqoX7c9EgqGdNe423+oFTFmWTQkQs95TL2XZUjAeP:k7IEgq2e423RhFmWxj95TAqAeP
Static task
static1
Behavioral task
behavioral1
Sample
ab736a636c06971e2d605a7b5788a7c7_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
133tfox.no-ip.org
Targets
-
-
Target
ab736a636c06971e2d605a7b5788a7c7_JaffaCakes118
-
Size
75KB
-
MD5
ab736a636c06971e2d605a7b5788a7c7
-
SHA1
45c5f2bf22151a8cdfc58593d559dffbc3b9e14f
-
SHA256
4e46dcb5edc79a4132579e1b1cc3e9c361cee08f546e6722dd3c69a2d7caef6f
-
SHA512
dbfceaf2b75866f3f9798e4d25f43b43f1f3f5164c83bdb6c9daf5e07be1355dc8b3069198c6d13b39a2191be95ca178f4bfad76021828642ef0ca7131b12678
-
SSDEEP
1536:upqoX7c9EgqGdNe423+oFTFmWTQkQs95TL2XZUjAeP:k7IEgq2e423RhFmWxj95TAqAeP
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext
-