General
-
Target
ba7a6160f39bc78a48701eea66156a1c_JaffaCakes118
-
Size
724KB
-
Sample
241202-2fdnfaskhp
-
MD5
ba7a6160f39bc78a48701eea66156a1c
-
SHA1
0140dafae4956a19b424195afa83117717aa55b0
-
SHA256
424aa51646d8e3003e9ca8cfc0da3e50877b46a3a297bf4dcaa30e07c4ad9641
-
SHA512
8cc867efd21f3c39c050171abe7c1c783346dac1b2d28f8808cdb4a8382760c74ffc2bb4ee4a488f18ae41e5565e25c54d0532950b3ec1db423da228563aa461
-
SSDEEP
3072:7sTkgR6gA2YQCO17fami7muyjKZOAo2XDphzMn8cvlGE5o19jYkCy7A6iw6QL7Z0:7Z8hzCEw
Static task
static1
Behavioral task
behavioral1
Sample
ba7a6160f39bc78a48701eea66156a1c_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
abdallam.no-ip.biz
Targets
-
-
Target
ba7a6160f39bc78a48701eea66156a1c_JaffaCakes118
-
Size
724KB
-
MD5
ba7a6160f39bc78a48701eea66156a1c
-
SHA1
0140dafae4956a19b424195afa83117717aa55b0
-
SHA256
424aa51646d8e3003e9ca8cfc0da3e50877b46a3a297bf4dcaa30e07c4ad9641
-
SHA512
8cc867efd21f3c39c050171abe7c1c783346dac1b2d28f8808cdb4a8382760c74ffc2bb4ee4a488f18ae41e5565e25c54d0532950b3ec1db423da228563aa461
-
SSDEEP
3072:7sTkgR6gA2YQCO17fami7muyjKZOAo2XDphzMn8cvlGE5o19jYkCy7A6iw6QL7Z0:7Z8hzCEw
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext
-