Overview
overview
10Static
static
3355f0c922b...18.exe
windows7-x64
10355f0c922b...18.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/Yipaparopip.dll
windows7-x64
3$TEMP/Yipaparopip.dll
windows10-2004-x64
3$TEMP/kilajiboxaz.dll
windows7-x64
3$TEMP/kilajiboxaz.dll
windows10-2004-x64
3$TEMP/xumusukezel.dll
windows7-x64
3$TEMP/xumusukezel.dll
windows10-2004-x64
3General
-
Target
355f0c922b2efadca99bba365abcc99d_JaffaCakes118
-
Size
443KB
-
Sample
241011-saf2yatakr
-
MD5
355f0c922b2efadca99bba365abcc99d
-
SHA1
2be8b4795a73cc4a7ffe0dfb0b5d14fea1ae745d
-
SHA256
e146e730603dc35dbd9676292fa24bd27043927b8a8e51a41aeafcf20a0274d6
-
SHA512
d3c44a057ff402a61e77c2778e2699a29db0e7d89914cadd7478b47df0507861b839e5432d2b4e1f2ac99686d7ba5a754a4abe3afd5ebdef18e6c9736f062f4c
-
SSDEEP
12288:+qvd7TxMNVCvJexkoLLT2e/Dx0bHE9brK4pC93vJ:+qNxMN8vJcjLLT2eLxe+JwtvJ
Static task
static1
Behavioral task
behavioral1
Sample
355f0c922b2efadca99bba365abcc99d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
355f0c922b2efadca99bba365abcc99d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/Yipaparopip.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$TEMP/Yipaparopip.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$TEMP/kilajiboxaz.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$TEMP/kilajiboxaz.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$TEMP/xumusukezel.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$TEMP/xumusukezel.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
355f0c922b2efadca99bba365abcc99d_JaffaCakes118
-
Size
443KB
-
MD5
355f0c922b2efadca99bba365abcc99d
-
SHA1
2be8b4795a73cc4a7ffe0dfb0b5d14fea1ae745d
-
SHA256
e146e730603dc35dbd9676292fa24bd27043927b8a8e51a41aeafcf20a0274d6
-
SHA512
d3c44a057ff402a61e77c2778e2699a29db0e7d89914cadd7478b47df0507861b839e5432d2b4e1f2ac99686d7ba5a754a4abe3afd5ebdef18e6c9736f062f4c
-
SSDEEP
12288:+qvd7TxMNVCvJexkoLLT2e/Dx0bHE9brK4pC93vJ:+qNxMN8vJcjLLT2eLxe+JwtvJ
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
c17103ae9072a06da581dec998343fc1
-
SHA1
b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
-
SHA256
dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
-
SHA512
d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
SSDEEP
192:7DKnJZCv6VmbJQC+tFiUdK7ckD4gRXKQx+LQ2CSF:7ViJrtFRdbmXK8+PCw
Score3/10 -
-
-
Target
$TEMP/Yipaparopip.dll
-
Size
4KB
-
MD5
8c2d927ad3d4122ffce2ec017511346f
-
SHA1
c9de4693006190b42b6cdb64fa1bf1f2a6f20dd9
-
SHA256
d48ce7c3f7e8dde461c3e6ab094c219b274865ff8bb45b48bc9787bd84df5282
-
SHA512
203895334640b4b5051702a9a6c9494917695295ac1d600bd697de2f15c40887e4ad5ce721753afdcdacc332aee71a2805671a1da0ab891c9281d2725c744def
Score3/10 -
-
-
Target
$TEMP/kilajiboxaz.dll
-
Size
3KB
-
MD5
c59eec013266dca85084fbf25873c1b1
-
SHA1
a3485cfa01e16290596f8582074f8f99299181f0
-
SHA256
4768c4906f70aea55489569e6ecec2d537909dc56cfb7e95f0928f76c65ad779
-
SHA512
ead586254e84e594e0cc44718bae1950bd340d563c440c991ec10f6249d78493cd690f7c5aeb47fd0b294642df70fe7d0792b18adbfde4801d57dcfedd0e8464
Score3/10 -
-
-
Target
$TEMP/xumusukezel.dll
-
Size
11KB
-
MD5
a5ddfed34e1bc07bc1def60ea15fc7b4
-
SHA1
a6c091b576386ec987e1217ef44a952f705395e5
-
SHA256
25acb7776cbb8f8ace077bb83a4f2f998d5549c4967beda373d5e7ed26d99511
-
SHA512
a4c5ed24f1ccf48681086165a01ee2d370fbac8d3fa268432640cb6b5f682b2fe702fe0c30746244c0a3f1f25305f9ff508c9815cb3aa7635444f08d1264eb47
-
SSDEEP
192:sA+Q2Vg9WN2BEJiikgImN64xgefo98xfSRwQt4DM:N2i9WNUzCVxg78xfSaJM
Score3/10 -