General
-
Target
ea952e50775a0c698397e6ec5264efc3_JaffaCakes118
-
Size
216KB
-
Sample
240410-jlnrgsgd67
-
MD5
ea952e50775a0c698397e6ec5264efc3
-
SHA1
35573c9f02b72666de5bc3129e98dbe4e67043d1
-
SHA256
90b71a327684786c22c7a9f4e7b34c893d40ed0c2e14b49205d1d529857a7a06
-
SHA512
c075d047369269af168ae7888d46d0dfec885cf4cf38e576c6d2603af86132d53c62807ef9c5344e6afdff2f1c2896c96f55992aeee1f6ecd9920795d4e5c316
-
SSDEEP
6144:7DP0rJQH2vsWppq4llZVyaDtSECbGOW2eQRB4TPIbjy4IwZpow:7DclFpqcl/yaDtSECxJRB4TPGDp
Behavioral task
behavioral1
Sample
ea952e50775a0c698397e6ec5264efc3_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
bnatf1.hopto.org:23235
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
fadi1
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
ea952e50775a0c698397e6ec5264efc3_JaffaCakes118
-
Size
216KB
-
MD5
ea952e50775a0c698397e6ec5264efc3
-
SHA1
35573c9f02b72666de5bc3129e98dbe4e67043d1
-
SHA256
90b71a327684786c22c7a9f4e7b34c893d40ed0c2e14b49205d1d529857a7a06
-
SHA512
c075d047369269af168ae7888d46d0dfec885cf4cf38e576c6d2603af86132d53c62807ef9c5344e6afdff2f1c2896c96f55992aeee1f6ecd9920795d4e5c316
-
SSDEEP
6144:7DP0rJQH2vsWppq4llZVyaDtSECbGOW2eQRB4TPIbjy4IwZpow:7DclFpqcl/yaDtSECxJRB4TPGDp
-
NetWire RAT payload
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-