General
-
Target
232dac1d9fc750d6e8fd0848a701cc5b_JaffaCakes118
-
Size
44KB
-
Sample
240703-vw1pks1gqg
-
MD5
232dac1d9fc750d6e8fd0848a701cc5b
-
SHA1
1d4f3ea8aadfec33046b230e7a42f89c925e4120
-
SHA256
c9b58b9d8b35dfe055b94f30db012ece8b261c29caee459b328f5141529ee07d
-
SHA512
67c5020c4bc608db8d82e2563f70ecf19aae72e3853a2a7fbbc13f53e962a32f1d1e7983d345073d962c44f72c6f4a80209dd95a7cddc7738ca351006eadee83
-
SSDEEP
768:rBr+tjFqTPkAlfztB1lr6an3smTA8uvm2DfOTwYPImzo6J:FyRUHlrL1lr6an3TLuvm2buQ6o6J
Behavioral task
behavioral1
Sample
232dac1d9fc750d6e8fd0848a701cc5b_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
232dac1d9fc750d6e8fd0848a701cc5b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
xtremerat
ali0595.no-ip.biz
Targets
-
-
Target
232dac1d9fc750d6e8fd0848a701cc5b_JaffaCakes118
-
Size
44KB
-
MD5
232dac1d9fc750d6e8fd0848a701cc5b
-
SHA1
1d4f3ea8aadfec33046b230e7a42f89c925e4120
-
SHA256
c9b58b9d8b35dfe055b94f30db012ece8b261c29caee459b328f5141529ee07d
-
SHA512
67c5020c4bc608db8d82e2563f70ecf19aae72e3853a2a7fbbc13f53e962a32f1d1e7983d345073d962c44f72c6f4a80209dd95a7cddc7738ca351006eadee83
-
SSDEEP
768:rBr+tjFqTPkAlfztB1lr6an3smTA8uvm2DfOTwYPImzo6J:FyRUHlrL1lr6an3TLuvm2buQ6o6J
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Adds Run key to start application
-
Drops file in System32 directory
-