General
-
Target
b0d5c8abbaa4625087a2a43e00a6d47a_JaffaCakes118
-
Size
122KB
-
Sample
241129-m67lwawrhl
-
MD5
b0d5c8abbaa4625087a2a43e00a6d47a
-
SHA1
c42adfb169b90be84add9387ba875ab5cbcf638d
-
SHA256
d3bb9f49727406153a2aac4a0cab2a809f33b30eb86654b74754e398118718c1
-
SHA512
44fda4b602621954ccd522f0f3df046869e8e49447ca13fe3ebc738635d713d3686fab6b68dd0719dacfbd158e3bb8a8b7f042632297e7ffedaa26eecc2eeb1c
-
SSDEEP
3072:kCjAjjkir/I3l/hOhc6APDhOSnqt0YMcqxShc:XqR4yxAbgmUeS
Static task
static1
Behavioral task
behavioral1
Sample
b0d5c8abbaa4625087a2a43e00a6d47a_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
xtremerat
zipitru.no-ip.org
Targets
-
-
Target
b0d5c8abbaa4625087a2a43e00a6d47a_JaffaCakes118
-
Size
122KB
-
MD5
b0d5c8abbaa4625087a2a43e00a6d47a
-
SHA1
c42adfb169b90be84add9387ba875ab5cbcf638d
-
SHA256
d3bb9f49727406153a2aac4a0cab2a809f33b30eb86654b74754e398118718c1
-
SHA512
44fda4b602621954ccd522f0f3df046869e8e49447ca13fe3ebc738635d713d3686fab6b68dd0719dacfbd158e3bb8a8b7f042632297e7ffedaa26eecc2eeb1c
-
SSDEEP
3072:kCjAjjkir/I3l/hOhc6APDhOSnqt0YMcqxShc:XqR4yxAbgmUeS
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-