General
-
Target
04bbdd921511f861a0f57266f1b4df74_JaffaCakes118
-
Size
1.2MB
-
Sample
240428-jxhplsbe6v
-
MD5
04bbdd921511f861a0f57266f1b4df74
-
SHA1
9bc604264b0bbb72e4676a03410b362d13dfc4fe
-
SHA256
0e96012b8943538086ce528e979199c5d70c30ed8baac4336f43ae02a410a769
-
SHA512
29a1566adbee4a9271279af58f97746e1cb47f5cd3d046cf4cf7737dc59f9595f80aecca06ff7b9cdb18cd4377958cddb3ee984b1746ba2a954d1bfe1b316da1
-
SSDEEP
24576:n6dCrRs7z+jfzalONIoo7LGOb7Bwew9s6yApEwviC9P:6YqO1o7/63pEq
Static task
static1
Behavioral task
behavioral1
Sample
04bbdd921511f861a0f57266f1b4df74_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
04bbdd921511f861a0f57266f1b4df74_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
netwire
pd1n.ddns.net:1968
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
pd1n-noip
-
lock_executable
false
-
offline_keylogger
false
-
password
Kimbolsapoq!P12
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
04bbdd921511f861a0f57266f1b4df74_JaffaCakes118
-
Size
1.2MB
-
MD5
04bbdd921511f861a0f57266f1b4df74
-
SHA1
9bc604264b0bbb72e4676a03410b362d13dfc4fe
-
SHA256
0e96012b8943538086ce528e979199c5d70c30ed8baac4336f43ae02a410a769
-
SHA512
29a1566adbee4a9271279af58f97746e1cb47f5cd3d046cf4cf7737dc59f9595f80aecca06ff7b9cdb18cd4377958cddb3ee984b1746ba2a954d1bfe1b316da1
-
SSDEEP
24576:n6dCrRs7z+jfzalONIoo7LGOb7Bwew9s6yApEwviC9P:6YqO1o7/63pEq
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-