General
-
Target
JaffaCakes118_52d6445271700467d4c2a8cbef92088e
-
Size
157KB
-
Sample
250129-fc53ma1mhy
-
MD5
52d6445271700467d4c2a8cbef92088e
-
SHA1
1271de90f53693462d47fccb1292d85d1255c35d
-
SHA256
8407faeeafcbe2db98998240623efe895cb59d3cc7c5e730e1ed44899e1dd346
-
SHA512
17cef756fa078b88de22ca95feaed253f54becd755d883648be1aef52ec55c9cba3a603f0f816bea9608a0fb0cd8857c90cef100850f5e9c9160cdfc7fa21e7f
-
SSDEEP
3072:jagY+O7ioNwoh/4XZHgv+viAqYMgvPT70xhBs+9fvjtx:GgmQZHgv+v9370xXHZx
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_52d6445271700467d4c2a8cbef92088e.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
JaffaCakes118_52d6445271700467d4c2a8cbef92088e
-
Size
157KB
-
MD5
52d6445271700467d4c2a8cbef92088e
-
SHA1
1271de90f53693462d47fccb1292d85d1255c35d
-
SHA256
8407faeeafcbe2db98998240623efe895cb59d3cc7c5e730e1ed44899e1dd346
-
SHA512
17cef756fa078b88de22ca95feaed253f54becd755d883648be1aef52ec55c9cba3a603f0f816bea9608a0fb0cd8857c90cef100850f5e9c9160cdfc7fa21e7f
-
SSDEEP
3072:jagY+O7ioNwoh/4XZHgv+viAqYMgvPT70xhBs+9fvjtx:GgmQZHgv+v9370xXHZx
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Suspicious use of SetThreadContext
-