General
-
Target
JaffaCakes118_08c335fad183d43581ea091d978a99b4
-
Size
719KB
-
Sample
250220-bkehesvmz6
-
MD5
08c335fad183d43581ea091d978a99b4
-
SHA1
b3dd3b452fbe812e689b0d2f0d09e98b9c50d590
-
SHA256
6e346988e05a8bcb1204ca7e75219e7b3c3ef9efe537dec743478518c83212c2
-
SHA512
dd843c962ba08ab4b9b5ba93833fa705b7159e8c6ddfed276abb7cad279a52786518ed4883ef5e21d9633a31a19ce359c17b6a7ebd72f2478e07b6229d378ea0
-
SSDEEP
12288:HhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aeu054W4QdH1l:NRmJkcoQricOIQxiZY1iaeu7WN
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_08c335fad183d43581ea091d978a99b4.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
JaffaCakes118_08c335fad183d43581ea091d978a99b4
-
Size
719KB
-
MD5
08c335fad183d43581ea091d978a99b4
-
SHA1
b3dd3b452fbe812e689b0d2f0d09e98b9c50d590
-
SHA256
6e346988e05a8bcb1204ca7e75219e7b3c3ef9efe537dec743478518c83212c2
-
SHA512
dd843c962ba08ab4b9b5ba93833fa705b7159e8c6ddfed276abb7cad279a52786518ed4883ef5e21d9633a31a19ce359c17b6a7ebd72f2478e07b6229d378ea0
-
SSDEEP
12288:HhkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aeu054W4QdH1l:NRmJkcoQricOIQxiZY1iaeu7WN
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-