General
-
Target
JaffaCakes118_c7b1e483329997a55ddf48c48014c703
-
Size
140KB
-
Sample
250208-1j2zrsvnew
-
MD5
c7b1e483329997a55ddf48c48014c703
-
SHA1
65d7942ac561dd33fe06518194eecf801b11d485
-
SHA256
a2f412450206574cc56000839c22793678f243c1288c0f58d58f5defa5c5454d
-
SHA512
74fc5e49f24f7aa837f8fd2b5a6f42a1d54b739f05cb2e4167132509caadee51f82925744efe15e1c00b0a0815def8de7e3d61df98bab50481cbd71497cf1582
-
SSDEEP
3072:eZRa2AjGRD34WPjykgJnZO/TIxM75QHPUk090C5mi:eORrWYJCIxA5eMk090CT
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c7b1e483329997a55ddf48c48014c703.exe
Resource
win7-20240729-en
Malware Config
Extracted
xtremerat
majd99.no-ip.biz
Targets
-
-
Target
JaffaCakes118_c7b1e483329997a55ddf48c48014c703
-
Size
140KB
-
MD5
c7b1e483329997a55ddf48c48014c703
-
SHA1
65d7942ac561dd33fe06518194eecf801b11d485
-
SHA256
a2f412450206574cc56000839c22793678f243c1288c0f58d58f5defa5c5454d
-
SHA512
74fc5e49f24f7aa837f8fd2b5a6f42a1d54b739f05cb2e4167132509caadee51f82925744efe15e1c00b0a0815def8de7e3d61df98bab50481cbd71497cf1582
-
SSDEEP
3072:eZRa2AjGRD34WPjykgJnZO/TIxM75QHPUk090C5mi:eORrWYJCIxA5eMk090CT
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext
-