General
-
Target
JaffaCakes118_d2f4f2ce9f0b24f4e95f17d05400b58f
-
Size
261KB
-
Sample
250119-zqdp3svrcv
-
MD5
d2f4f2ce9f0b24f4e95f17d05400b58f
-
SHA1
75a53216ae4e9119bad516a19f5a96e455fce6d2
-
SHA256
12187a203bed0b7050eab25f2a053dc26f8bd9eae2ecc8fa3a2caab7a379ac50
-
SHA512
d919b434278a002b5714789589d8ba593a3ed1f75d5d72b0467938c7a25af741f28a2356cd6021530ef0fc85373980c03a279eb26502d580746eb5b3620e29ea
-
SSDEEP
6144:/MqPhsvTkou98LwvP6bQ7yMP+DE827fVdoj:/MqP8Tw6b7MP+Dd27VKj
Behavioral task
behavioral1
Sample
JaffaCakes118_d2f4f2ce9f0b24f4e95f17d05400b58f.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
trojandeneme001.zapto.org
Targets
-
-
Target
JaffaCakes118_d2f4f2ce9f0b24f4e95f17d05400b58f
-
Size
261KB
-
MD5
d2f4f2ce9f0b24f4e95f17d05400b58f
-
SHA1
75a53216ae4e9119bad516a19f5a96e455fce6d2
-
SHA256
12187a203bed0b7050eab25f2a053dc26f8bd9eae2ecc8fa3a2caab7a379ac50
-
SHA512
d919b434278a002b5714789589d8ba593a3ed1f75d5d72b0467938c7a25af741f28a2356cd6021530ef0fc85373980c03a279eb26502d580746eb5b3620e29ea
-
SSDEEP
6144:/MqPhsvTkou98LwvP6bQ7yMP+DE827fVdoj:/MqP8Tw6b7MP+Dd27VKj
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-