General
-
Target
JaffaCakes118_423c6130a471c600f8d376528702fd15
-
Size
124KB
-
Sample
250114-wqy48sxkgl
-
MD5
423c6130a471c600f8d376528702fd15
-
SHA1
022e4a467677920b4cc46bcbfaceb35bccf6274c
-
SHA256
2999f314a6bed51858277069fbaf9ca01d506871d7e7bd4798e76ebc977b4762
-
SHA512
36608ce1a457c8a358c0752d0975ca7d5e8b44eda87851d6032bd6eeba4bc11cd9d83f77037080a3d7ac98a8f40a63f1dbdea11ae5327fd745f71d7ea3d13210
-
SSDEEP
3072:/7qXvBlJ9ks1I3cieVDlrJA0iqqyXI5hgsODDjKP:zEvLJys1XieVDBfXEh18S
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_423c6130a471c600f8d376528702fd15.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
dannymatrix.no-ip.org
Targets
-
-
Target
JaffaCakes118_423c6130a471c600f8d376528702fd15
-
Size
124KB
-
MD5
423c6130a471c600f8d376528702fd15
-
SHA1
022e4a467677920b4cc46bcbfaceb35bccf6274c
-
SHA256
2999f314a6bed51858277069fbaf9ca01d506871d7e7bd4798e76ebc977b4762
-
SHA512
36608ce1a457c8a358c0752d0975ca7d5e8b44eda87851d6032bd6eeba4bc11cd9d83f77037080a3d7ac98a8f40a63f1dbdea11ae5327fd745f71d7ea3d13210
-
SSDEEP
3072:/7qXvBlJ9ks1I3cieVDlrJA0iqqyXI5hgsODDjKP:zEvLJys1XieVDBfXEh18S
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-