General
-
Target
JaffaCakes118_8c8b32e34654515fdb07baeb6548e8cd
-
Size
815KB
-
Sample
250117-qcvxrszkck
-
MD5
8c8b32e34654515fdb07baeb6548e8cd
-
SHA1
66d67489d3b2b70f2e36706b32b053688343c939
-
SHA256
23b7be94ac173398c3626382f7b475ad13fc299afe3788e6812502b23592cb0b
-
SHA512
77b6d7d524f56e75a3a3ee5001fc2e027cfcd945db6724a9750ab3a3646ba5b1cbde72fa88b7ce71a40c5d8c5af4344fe0cfe0a1891dffceea32f8a707729d7c
-
SSDEEP
12288:fo2iE8n9yXz4LSiecUoSkBBjjPOMccUXas2HFJHIg4uDz:gb9yhrgHPFccAH2HFJHIgJz
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8c8b32e34654515fdb07baeb6548e8cd.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
nerozhack.ddns.com.br
alonedevil.no-ip.org
gameszero.dyndns.org
Targets
-
-
Target
JaffaCakes118_8c8b32e34654515fdb07baeb6548e8cd
-
Size
815KB
-
MD5
8c8b32e34654515fdb07baeb6548e8cd
-
SHA1
66d67489d3b2b70f2e36706b32b053688343c939
-
SHA256
23b7be94ac173398c3626382f7b475ad13fc299afe3788e6812502b23592cb0b
-
SHA512
77b6d7d524f56e75a3a3ee5001fc2e027cfcd945db6724a9750ab3a3646ba5b1cbde72fa88b7ce71a40c5d8c5af4344fe0cfe0a1891dffceea32f8a707729d7c
-
SSDEEP
12288:fo2iE8n9yXz4LSiecUoSkBBjjPOMccUXas2HFJHIg4uDz:gb9yhrgHPFccAH2HFJHIgJz
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Drops file in Drivers directory
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-