General
-
Target
JaffaCakes118_925ab685956e7f42173c2200d2b25397
-
Size
144KB
-
Sample
250204-lgjyvatqcm
-
MD5
925ab685956e7f42173c2200d2b25397
-
SHA1
098b8a082f9733848ea4bf5c8a39ab2d6a5b0bc8
-
SHA256
789cfb02916c709c9577baf9b846ede556ad07f29b3c3818b1c9f30bd26e870e
-
SHA512
9fb75d495c96947f5cfad85ebac61bc8dd37d7f6dafd058170a675b4cf340e776b694692d6a0e5a68fbb06934871e803b6df344127f9b6add82808df29a90b44
-
SSDEEP
3072:88807IRJ5b+j/Bws9U1cQCGb6LKyzEIMmDX5Afo8COj:8LV+j/moPXf2FIMmzK
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_925ab685956e7f42173c2200d2b25397.exe
Resource
win7-20241010-en
Malware Config
Extracted
xtremerat
a411.no-ip.info
Targets
-
-
Target
JaffaCakes118_925ab685956e7f42173c2200d2b25397
-
Size
144KB
-
MD5
925ab685956e7f42173c2200d2b25397
-
SHA1
098b8a082f9733848ea4bf5c8a39ab2d6a5b0bc8
-
SHA256
789cfb02916c709c9577baf9b846ede556ad07f29b3c3818b1c9f30bd26e870e
-
SHA512
9fb75d495c96947f5cfad85ebac61bc8dd37d7f6dafd058170a675b4cf340e776b694692d6a0e5a68fbb06934871e803b6df344127f9b6add82808df29a90b44
-
SSDEEP
3072:88807IRJ5b+j/Bws9U1cQCGb6LKyzEIMmDX5Afo8COj:8LV+j/moPXf2FIMmzK
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-