General
-
Target
JaffaCakes118_b60c6bc455f1f2c317ca9758554895e5
-
Size
184KB
-
Sample
250413-3pg8nawzby
-
MD5
b60c6bc455f1f2c317ca9758554895e5
-
SHA1
4ce05d7a75622be2cfe3c4c300d327f2a0c3d78f
-
SHA256
29563bb280effd8538bcd95c9debc65447a4c17856d949771c15822a05980f86
-
SHA512
c27eafa0b084f1f9580220b2ec88d80572ebb883f39d10d25da4cf4af58ef8a4e927bab2c53a9ff84f66debd543abf0a50b2f0973d4e7c68acad09a9ef04ff54
-
SSDEEP
3072:fN9fU+4gkv5CgZ3k+uGTMUQhLQK965LlgdpB29jrgc2dMQ:AIkv5538UpxdlgdpYtO
Static task
static1
Malware Config
Extracted
xtremerat
r3dz80.no-ip.info
Targets
-
-
Target
JaffaCakes118_b60c6bc455f1f2c317ca9758554895e5
-
Size
184KB
-
MD5
b60c6bc455f1f2c317ca9758554895e5
-
SHA1
4ce05d7a75622be2cfe3c4c300d327f2a0c3d78f
-
SHA256
29563bb280effd8538bcd95c9debc65447a4c17856d949771c15822a05980f86
-
SHA512
c27eafa0b084f1f9580220b2ec88d80572ebb883f39d10d25da4cf4af58ef8a4e927bab2c53a9ff84f66debd543abf0a50b2f0973d4e7c68acad09a9ef04ff54
-
SSDEEP
3072:fN9fU+4gkv5CgZ3k+uGTMUQhLQK965LlgdpB29jrgc2dMQ:AIkv5538UpxdlgdpYtO
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-