General
-
Target
JaffaCakes118_4617ceefd7b838f667bbae2aef6a97af
-
Size
195KB
-
Sample
250114-1h36fasqan
-
MD5
4617ceefd7b838f667bbae2aef6a97af
-
SHA1
3e20b2377d42804ed074008d30d3be31833de912
-
SHA256
1e6282815f916ebdf0a16d52c70cda53ed79c4a0f08dce9596b9d5e6486b2185
-
SHA512
1f84a62e58867571598c3d5959d37fe890c263ecc1d8a2d72ef40255ac9810f3bad3e758912101ff0e77b640de86aafde5724479d6b338d89acf42c2524cd67c
-
SSDEEP
3072:cQy/BGjPSQuu52F3Dncm51r1Xod7Mu4q583sQ+jxIcGCSn8y:q6aQB5U3DF2d7M483sfjGnf8y
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4617ceefd7b838f667bbae2aef6a97af.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4617ceefd7b838f667bbae2aef6a97af.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xtremerat
dark3zooz.tzo.org
Targets
-
-
Target
JaffaCakes118_4617ceefd7b838f667bbae2aef6a97af
-
Size
195KB
-
MD5
4617ceefd7b838f667bbae2aef6a97af
-
SHA1
3e20b2377d42804ed074008d30d3be31833de912
-
SHA256
1e6282815f916ebdf0a16d52c70cda53ed79c4a0f08dce9596b9d5e6486b2185
-
SHA512
1f84a62e58867571598c3d5959d37fe890c263ecc1d8a2d72ef40255ac9810f3bad3e758912101ff0e77b640de86aafde5724479d6b338d89acf42c2524cd67c
-
SSDEEP
3072:cQy/BGjPSQuu52F3Dncm51r1Xod7Mu4q583sQ+jxIcGCSn8y:q6aQB5U3DF2d7M483sfjGnf8y
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext
-