General
-
Target
JaffaCakes118_49903a1f7b3e8018132a6c757f4c75c3
-
Size
872KB
-
Sample
250128-lxk6vavncz
-
MD5
49903a1f7b3e8018132a6c757f4c75c3
-
SHA1
0522dd27679f2a6c3c781a26365ecf0d97ea9061
-
SHA256
356302f99a32f089bf48764621c9cf6e38c08f112b6e82d1b475efaa2192bfc6
-
SHA512
85a46ce914863bb38712338bcc5892669fe4be54e7fde853dca2222eea854bb59933cbe1716a7ce0c657a9e14fc70fc98e0e5d4acf1db2d0872655ba1b28358e
-
SSDEEP
6144:U9XRz+saO24Pr7yyrBIErxcYKJZCHbmWaOGRryrBIErxcYKJZCHbmWaOGR+7:U9Xf24DVBIEqYKqHqhO/BIEqYKqHqhO
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_49903a1f7b3e8018132a6c757f4c75c3.exe
Resource
win7-20241023-en
Malware Config
Extracted
xtremerat
ehec.no-ip.info
Targets
-
-
Target
JaffaCakes118_49903a1f7b3e8018132a6c757f4c75c3
-
Size
872KB
-
MD5
49903a1f7b3e8018132a6c757f4c75c3
-
SHA1
0522dd27679f2a6c3c781a26365ecf0d97ea9061
-
SHA256
356302f99a32f089bf48764621c9cf6e38c08f112b6e82d1b475efaa2192bfc6
-
SHA512
85a46ce914863bb38712338bcc5892669fe4be54e7fde853dca2222eea854bb59933cbe1716a7ce0c657a9e14fc70fc98e0e5d4acf1db2d0872655ba1b28358e
-
SSDEEP
6144:U9XRz+saO24Pr7yyrBIErxcYKJZCHbmWaOGRryrBIErxcYKJZCHbmWaOGR+7:U9Xf24DVBIEqYKqHqhO/BIEqYKqHqhO
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-