General
-
Target
JaffaCakes118_1089d97c1bb4af5faba0824b4229680a
-
Size
553KB
-
Sample
250122-yez89ssjhz
-
MD5
1089d97c1bb4af5faba0824b4229680a
-
SHA1
992be1b85bfd99e71e13e6d8e43e159bf24dda20
-
SHA256
333a7ae0a53833e8c6a300b13e2aa22da804cd9eda231a2695d45c53c45eef4c
-
SHA512
64dd92abaf75ee64b942485cc7852f6b1b6bdc815844c9cebb3b4ed594b1ca1a9b512a329ee39171fc805e827ff6b7e8a366712d8640b3b79343f0d84b5f4f24
-
SSDEEP
12288:V3wL2VrY1yoteRLQqda8V02gU1g7ltxZYO3ncvnl:s7/4LSfxZYOXCl
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1089d97c1bb4af5faba0824b4229680a.exe
Resource
win7-20241023-en
Malware Config
Extracted
xtremerat
franco1.no-ip.org
Targets
-
-
Target
JaffaCakes118_1089d97c1bb4af5faba0824b4229680a
-
Size
553KB
-
MD5
1089d97c1bb4af5faba0824b4229680a
-
SHA1
992be1b85bfd99e71e13e6d8e43e159bf24dda20
-
SHA256
333a7ae0a53833e8c6a300b13e2aa22da804cd9eda231a2695d45c53c45eef4c
-
SHA512
64dd92abaf75ee64b942485cc7852f6b1b6bdc815844c9cebb3b4ed594b1ca1a9b512a329ee39171fc805e827ff6b7e8a366712d8640b3b79343f0d84b5f4f24
-
SSDEEP
12288:V3wL2VrY1yoteRLQqda8V02gU1g7ltxZYO3ncvnl:s7/4LSfxZYOXCl
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext
-