General
-
Target
fd71393eda58df36ee3618f526ffb3e0_JaffaCakes118
-
Size
852KB
-
Sample
240420-xv42qaff48
-
MD5
fd71393eda58df36ee3618f526ffb3e0
-
SHA1
0d1a0cd0660099f34f8620dd7b338b0b6ab3671d
-
SHA256
e07abb182a17f0aa383972c376849fd46a74f105a2f2c5f949441028a66c5538
-
SHA512
b22aed4b27466d9bde1236bf7643e8f81c148e9f4e7bce92b93abb9513b61935bd4fdb6648ffa5338f395f38a90fbbd11fb410dd80f82755093c5a15dceaadd3
-
SSDEEP
24576:iRmJkcoQricOIQxiZY1iaSAD00jSORI6Ttm8:3JZoQrbTFZY1iaSADmO
Static task
static1
Behavioral task
behavioral1
Sample
fd71393eda58df36ee3618f526ffb3e0_JaffaCakes118.exe
Resource
win7-20240220-en
Malware Config
Extracted
netwire
benti.ddns.net:3350
-
activex_autorun
true
-
activex_key
{2FMC35P2-J0LB-143R-SR61-UGN00XFQ045P}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
Adobe
-
use_mutex
false
Targets
-
-
Target
fd71393eda58df36ee3618f526ffb3e0_JaffaCakes118
-
Size
852KB
-
MD5
fd71393eda58df36ee3618f526ffb3e0
-
SHA1
0d1a0cd0660099f34f8620dd7b338b0b6ab3671d
-
SHA256
e07abb182a17f0aa383972c376849fd46a74f105a2f2c5f949441028a66c5538
-
SHA512
b22aed4b27466d9bde1236bf7643e8f81c148e9f4e7bce92b93abb9513b61935bd4fdb6648ffa5338f395f38a90fbbd11fb410dd80f82755093c5a15dceaadd3
-
SSDEEP
24576:iRmJkcoQricOIQxiZY1iaSAD00jSORI6Ttm8:3JZoQrbTFZY1iaSADmO
-
NetWire RAT payload
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-