General
-
Target
JaffaCakes118_c4bec08a7d4e65710317bd8c5e32f7e3
-
Size
97KB
-
Sample
250208-tckctatma1
-
MD5
c4bec08a7d4e65710317bd8c5e32f7e3
-
SHA1
ade7ee609e3c25d576568a29a332872b266bdc20
-
SHA256
3f7c9c97010e043df357cea88cf1ad4f2c7075731676389bd6fd7043e75fb8f9
-
SHA512
c961c71f816b52585957216ae19947e156e4cb430ad28de4dcbf09c6d9d791c052448fbe07769790065458301c7a7f1b674c196639bb154424202c11aa18ff78
-
SSDEEP
1536:68g+JSXNSeVeJUauz0z9OjGQehxVuH7VtOhlthndT0BFLnE+G6DxCEp:6R+JSdSBuz0z9OjG1xUx8/tpdgfEwLp
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c4bec08a7d4e65710317bd8c5e32f7e3.exe
Resource
win7-20240903-en
Malware Config
Extracted
xtremerat
franco1.no-ip.org
Targets
-
-
Target
JaffaCakes118_c4bec08a7d4e65710317bd8c5e32f7e3
-
Size
97KB
-
MD5
c4bec08a7d4e65710317bd8c5e32f7e3
-
SHA1
ade7ee609e3c25d576568a29a332872b266bdc20
-
SHA256
3f7c9c97010e043df357cea88cf1ad4f2c7075731676389bd6fd7043e75fb8f9
-
SHA512
c961c71f816b52585957216ae19947e156e4cb430ad28de4dcbf09c6d9d791c052448fbe07769790065458301c7a7f1b674c196639bb154424202c11aa18ff78
-
SSDEEP
1536:68g+JSXNSeVeJUauz0z9OjGQehxVuH7VtOhlthndT0BFLnE+G6DxCEp:6R+JSdSBuz0z9OjG1xUx8/tpdgfEwLp
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext
-