General
-
Target
7d35267608831170c47e95b5f967ca0c_JaffaCakes118
-
Size
1.0MB
-
Sample
240401-3evq1aaa5v
-
MD5
7d35267608831170c47e95b5f967ca0c
-
SHA1
2896d1e9e30e6734fcaaeef9a3f969ce920e8672
-
SHA256
f498998ca81fa00f797727fd0209c7207ad8a2b0703e2ca12f5e309364c24d8f
-
SHA512
b57b1f72ca75f1efb89e9545152be5db4bfe94bcd02548a918e3124cac8463fea603f14d6f71fef199e013f3f6522c109a640451b6561907c2992fe388a4de45
-
SSDEEP
24576:UfTEVFFV5g3YQqVECAKa9Zz+i08v0wHPy9GN01:UfTEVFFHg3AErxR+uv0Y6cG
Static task
static1
Behavioral task
behavioral1
Sample
7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d35267608831170c47e95b5f967ca0c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
agencies.duckdns.org:10130
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
travels
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
webmonitor
sanders.wm01.to:443
-
config_key
BvzaT1rL9C6tpOhPi8yqPN03WnzPPc6c
-
private_key
oz5d2fXwy
-
url_path
/recv4.php
Targets
-
-
Target
7d35267608831170c47e95b5f967ca0c_JaffaCakes118
-
Size
1.0MB
-
MD5
7d35267608831170c47e95b5f967ca0c
-
SHA1
2896d1e9e30e6734fcaaeef9a3f969ce920e8672
-
SHA256
f498998ca81fa00f797727fd0209c7207ad8a2b0703e2ca12f5e309364c24d8f
-
SHA512
b57b1f72ca75f1efb89e9545152be5db4bfe94bcd02548a918e3124cac8463fea603f14d6f71fef199e013f3f6522c109a640451b6561907c2992fe388a4de45
-
SSDEEP
24576:UfTEVFFV5g3YQqVECAKa9Zz+i08v0wHPy9GN01:UfTEVFFHg3AErxR+uv0Y6cG
-
NetWire RAT payload
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-