General
-
Target
JaffaCakes118_6f6dfc2d978bf8a06b7168b75e02b700
-
Size
45KB
-
Sample
250103-zcbcssvmdm
-
MD5
6f6dfc2d978bf8a06b7168b75e02b700
-
SHA1
93518ef2927239d3c88909bec89d9ceac7de71d7
-
SHA256
a3bed068ee7b9ed3fc5f691de64dbc126fd48cee523a141d18a3773870622fb2
-
SHA512
74775f4940aa2f9b5c4f7de9e3507490225d62dbc3cca0fe5c17f3060253fea92ed5b8b02b4f42784ac8e7527f957c1ab9695f6c25939ad2546c358fae10437e
-
SSDEEP
768:9B7+tjFY90iY6W1jwmDzKgEFQXbklMIAnpbhwfOgw0c0zova:jCRh31jxPEFQXbk+pb4bpova
Behavioral task
behavioral1
Sample
JaffaCakes118_6f6dfc2d978bf8a06b7168b75e02b700.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6f6dfc2d978bf8a06b7168b75e02b700.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_6f6dfc2d978bf8a06b7168b75e02b700
-
Size
45KB
-
MD5
6f6dfc2d978bf8a06b7168b75e02b700
-
SHA1
93518ef2927239d3c88909bec89d9ceac7de71d7
-
SHA256
a3bed068ee7b9ed3fc5f691de64dbc126fd48cee523a141d18a3773870622fb2
-
SHA512
74775f4940aa2f9b5c4f7de9e3507490225d62dbc3cca0fe5c17f3060253fea92ed5b8b02b4f42784ac8e7527f957c1ab9695f6c25939ad2546c358fae10437e
-
SSDEEP
768:9B7+tjFY90iY6W1jwmDzKgEFQXbklMIAnpbhwfOgw0c0zova:jCRh31jxPEFQXbk+pb4bpova
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops file in System32 directory
-