General
-
Target
JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48
-
Size
944KB
-
Sample
250103-wqx7yayraq
-
MD5
6e7cc88bcd853bdc367674bc9533db48
-
SHA1
e1328a4a2ec375991a81a28dd00404c670748beb
-
SHA256
b3bfc99ee408e38c527d10dabc5123015b5d51cd3c8faed7339f74dd17251a41
-
SHA512
83df8ce5c5d832314d31ffde3b8d6a9a4e9a63158a7a2d78be9b345bf6b2c9c9851daf0d41ab1f244add5baa5df451eb90d70c2e70a7f809d99d7e4db3ae7506
-
SSDEEP
24576:1RmJkcoQricOIQxiZY1iaTyMt2oonDfbrlY:aJZoQrbTFZY1iaTyMtZonDfu
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48.exe
Resource
win7-20241023-en
Malware Config
Extracted
xtremerat
vovometralha6679.no-ip.org
Targets
-
-
Target
JaffaCakes118_6e7cc88bcd853bdc367674bc9533db48
-
Size
944KB
-
MD5
6e7cc88bcd853bdc367674bc9533db48
-
SHA1
e1328a4a2ec375991a81a28dd00404c670748beb
-
SHA256
b3bfc99ee408e38c527d10dabc5123015b5d51cd3c8faed7339f74dd17251a41
-
SHA512
83df8ce5c5d832314d31ffde3b8d6a9a4e9a63158a7a2d78be9b345bf6b2c9c9851daf0d41ab1f244add5baa5df451eb90d70c2e70a7f809d99d7e4db3ae7506
-
SSDEEP
24576:1RmJkcoQricOIQxiZY1iaTyMt2oonDfbrlY:aJZoQrbTFZY1iaTyMtZonDfu
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-