General
-
Target
JaffaCakes118_797d201e46cde4c679af90731b2ee6ba
-
Size
399KB
-
Sample
250104-nsgzqsznap
-
MD5
797d201e46cde4c679af90731b2ee6ba
-
SHA1
5a09d9769f96efc15dc1bf469201fc9e155dbd9f
-
SHA256
27ae9640d6bbb53b4c6cfdc6bb6e78509d0a3304fdbcdd93f74cfa24c8dd52ff
-
SHA512
ff75935ea20258c7a7d227c97f6cb15ab8e9187d622e1911701528b6ba3c905a98c121eb34efc4fdf236eca515a10c44e93798c3aa06a56bf7b19807ead4aa03
-
SSDEEP
3072:lDuLbG2l1EelksP4jm1aNKmaCEDvq+pFyNRYhxXK:lDuLr1EelksA61aN2COigeRP
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_797d201e46cde4c679af90731b2ee6ba.exe
Resource
win7-20241010-en
Malware Config
Extracted
xtremerat
hackedd.no-ip.org
Targets
-
-
Target
JaffaCakes118_797d201e46cde4c679af90731b2ee6ba
-
Size
399KB
-
MD5
797d201e46cde4c679af90731b2ee6ba
-
SHA1
5a09d9769f96efc15dc1bf469201fc9e155dbd9f
-
SHA256
27ae9640d6bbb53b4c6cfdc6bb6e78509d0a3304fdbcdd93f74cfa24c8dd52ff
-
SHA512
ff75935ea20258c7a7d227c97f6cb15ab8e9187d622e1911701528b6ba3c905a98c121eb34efc4fdf236eca515a10c44e93798c3aa06a56bf7b19807ead4aa03
-
SSDEEP
3072:lDuLbG2l1EelksP4jm1aNKmaCEDvq+pFyNRYhxXK:lDuLr1EelksA61aN2COigeRP
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext
-