General
-
Target
JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4
-
Size
809KB
-
Sample
250127-y5dsystrav
-
MD5
435b72cfbf939eb1f32f3d2f528e21c4
-
SHA1
f0320c280a25f03301586d1acd84edc9247d3da0
-
SHA256
2fe90d9427c800ef20af4d2987c95b602a47a82ca42a39b9e9c8ea82f109054a
-
SHA512
c726a5be311889f086091e2b622f66f6f6bf4a22ca0d8a57844ab1ae83ec0d964bbe8dbfae61b661aaf824ba0a6c120dae5ebf9cad7b85a376d908fe188abcaa
-
SSDEEP
12288:OuXdjyfHShflT8ZfMfHS3HHiL9QHB11hJ2BHjyDNT9Zs3Aym8Gm:OAyfHSMZU/siBKhJ2BHG9ZsQyme
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
mikropbisey.no-ip.biz
Targets
-
-
Target
JaffaCakes118_435b72cfbf939eb1f32f3d2f528e21c4
-
Size
809KB
-
MD5
435b72cfbf939eb1f32f3d2f528e21c4
-
SHA1
f0320c280a25f03301586d1acd84edc9247d3da0
-
SHA256
2fe90d9427c800ef20af4d2987c95b602a47a82ca42a39b9e9c8ea82f109054a
-
SHA512
c726a5be311889f086091e2b622f66f6f6bf4a22ca0d8a57844ab1ae83ec0d964bbe8dbfae61b661aaf824ba0a6c120dae5ebf9cad7b85a376d908fe188abcaa
-
SSDEEP
12288:OuXdjyfHShflT8ZfMfHS3HHiL9QHB11hJ2BHjyDNT9Zs3Aym8Gm:OAyfHSMZU/siBKhJ2BHG9ZsQyme
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-