General
-
Target
JaffaCakes118_d9798a31ce84b181f6883ebdbdc14aac
-
Size
97KB
-
Sample
250210-kkcs9svqek
-
MD5
d9798a31ce84b181f6883ebdbdc14aac
-
SHA1
17aaae4a5d11f15514542abc45c58a38570ca224
-
SHA256
4b8f2efc6b6708212a37f77d12106a05bfd95d2472b8b457ab106026931c8950
-
SHA512
5d30fc7c6991ea2d657e8808f3174e3d2aaf3468f39bf5553bea4d60c6a578c654cbddbb36256d47bd69602bf830f570d6eaa6fb572e35f724e44fc5ca5d0791
-
SSDEEP
1536:/7zXAgMgOFfBzXqNW71rcYDAWeotvXl6GLT:Tjl5OJjqNW7dEvotvX4GL
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d9798a31ce84b181f6883ebdbdc14aac.exe
Resource
win7-20241023-en
Malware Config
Extracted
xtremerat
franco1.no-ip.org
Targets
-
-
Target
JaffaCakes118_d9798a31ce84b181f6883ebdbdc14aac
-
Size
97KB
-
MD5
d9798a31ce84b181f6883ebdbdc14aac
-
SHA1
17aaae4a5d11f15514542abc45c58a38570ca224
-
SHA256
4b8f2efc6b6708212a37f77d12106a05bfd95d2472b8b457ab106026931c8950
-
SHA512
5d30fc7c6991ea2d657e8808f3174e3d2aaf3468f39bf5553bea4d60c6a578c654cbddbb36256d47bd69602bf830f570d6eaa6fb572e35f724e44fc5ca5d0791
-
SSDEEP
1536:/7zXAgMgOFfBzXqNW71rcYDAWeotvXl6GLT:Tjl5OJjqNW7dEvotvX4GL
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext
-