General
-
Target
2a4e877286a081781c052bc9cb0fa2d3_JaffaCakes118
-
Size
286KB
-
Sample
240708-akjlpsvhna
-
MD5
2a4e877286a081781c052bc9cb0fa2d3
-
SHA1
55f21bd29a5357b8fe13a23869d2a4028a82b3d8
-
SHA256
19a093712247513f549f74722b7e2f27d7f7ca6397aec49a12745bcffe52edd5
-
SHA512
e402b168d386b7bf68d860998b50965865628e1425915de85aeebb177cae3e57b9ba79ebf6766ee87cbd2dd25bd24b9ad52a5b78e37065b3f0ffca84ca49a653
-
SSDEEP
6144:fMkIgkaa4QDq4NWlwDWL/snc1eAnVW5GJZ2tNYLj8MfsCTOAK3px:t9kae3BDveeQVzYKj86sCCA6px
Static task
static1
Behavioral task
behavioral1
Sample
2a4e877286a081781c052bc9cb0fa2d3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2a4e877286a081781c052bc9cb0fa2d3_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
xtremerat
youcefsa.no-ip.biz
youcefza.no-ip.biz
Targets
-
-
Target
2a4e877286a081781c052bc9cb0fa2d3_JaffaCakes118
-
Size
286KB
-
MD5
2a4e877286a081781c052bc9cb0fa2d3
-
SHA1
55f21bd29a5357b8fe13a23869d2a4028a82b3d8
-
SHA256
19a093712247513f549f74722b7e2f27d7f7ca6397aec49a12745bcffe52edd5
-
SHA512
e402b168d386b7bf68d860998b50965865628e1425915de85aeebb177cae3e57b9ba79ebf6766ee87cbd2dd25bd24b9ad52a5b78e37065b3f0ffca84ca49a653
-
SSDEEP
6144:fMkIgkaa4QDq4NWlwDWL/snc1eAnVW5GJZ2tNYLj8MfsCTOAK3px:t9kae3BDveeQVzYKj86sCCA6px
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-