General
-
Target
JaffaCakes118_0d4f0146dac7bb66d30117264859d495
-
Size
89KB
-
Sample
250122-nvqdwsvrbl
-
MD5
0d4f0146dac7bb66d30117264859d495
-
SHA1
71c9ef78c66e478d43b79dcc15bbe3c35c5b5799
-
SHA256
396f69cafe1d18c1379cf6fcebb934edfeb33514f9508bc1ccf8dff96d3a9f4a
-
SHA512
f03939fba71741e7e4884efa6757e87c9a288b13e8ba581d0bec337b3c5d1f81231e577496a68c8d0e93edc178e2f00f7e38abe78c4c9efd87fbad69a4c64de4
-
SSDEEP
1536:XAw8GW8eCdVWQu6VqkQDw6S8aQrNfMiN/xhqdi8xIdGB1aVrNl6i/PQ:XAtwfNKDwpQrNfMiNyi8+dGB1aVrNjP
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0d4f0146dac7bb66d30117264859d495.exe
Resource
win7-20241010-en
Malware Config
Extracted
xtremerat
securitywindows.3utilities.com
Targets
-
-
Target
JaffaCakes118_0d4f0146dac7bb66d30117264859d495
-
Size
89KB
-
MD5
0d4f0146dac7bb66d30117264859d495
-
SHA1
71c9ef78c66e478d43b79dcc15bbe3c35c5b5799
-
SHA256
396f69cafe1d18c1379cf6fcebb934edfeb33514f9508bc1ccf8dff96d3a9f4a
-
SHA512
f03939fba71741e7e4884efa6757e87c9a288b13e8ba581d0bec337b3c5d1f81231e577496a68c8d0e93edc178e2f00f7e38abe78c4c9efd87fbad69a4c64de4
-
SSDEEP
1536:XAw8GW8eCdVWQu6VqkQDw6S8aQrNfMiN/xhqdi8xIdGB1aVrNl6i/PQ:XAtwfNKDwpQrNfMiNyi8+dGB1aVrNjP
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext
-