General
-
Target
0b0cef96675cd85fdbbe3e8968cbf924_JaffaCakes118
-
Size
1.1MB
-
Sample
240501-ezp49aff4z
-
MD5
0b0cef96675cd85fdbbe3e8968cbf924
-
SHA1
4db5d5b0425e5b83224fa6b3611385edfe314d20
-
SHA256
376523db4ccd1d021aa65208e85a665dcd1f83dbed024c1d1c0bb1d0bb24dd4f
-
SHA512
b7e3805e7c184405973684e68235ab68bebcf050d70c68901d14f2c9b489baca481b956517151e42dcf59ca6d1a1348e1a33f47766f15459ce00360e59642e07
-
SSDEEP
24576:9u6J33O0c+JY5UZ+XC0kGso6FauwvRTvev2mocWY:Pu0c++OCvkGs9FaukY
Static task
static1
Behavioral task
behavioral1
Sample
0b0cef96675cd85fdbbe3e8968cbf924_JaffaCakes118.exe
Resource
win7-20240220-en
Malware Config
Extracted
netwire
79.134.225.73:1968
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
pd1n9
-
lock_executable
false
-
mutex
KHAtGUwc
-
offline_keylogger
false
-
password
Kimbolsapoq!P13
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
0b0cef96675cd85fdbbe3e8968cbf924_JaffaCakes118
-
Size
1.1MB
-
MD5
0b0cef96675cd85fdbbe3e8968cbf924
-
SHA1
4db5d5b0425e5b83224fa6b3611385edfe314d20
-
SHA256
376523db4ccd1d021aa65208e85a665dcd1f83dbed024c1d1c0bb1d0bb24dd4f
-
SHA512
b7e3805e7c184405973684e68235ab68bebcf050d70c68901d14f2c9b489baca481b956517151e42dcf59ca6d1a1348e1a33f47766f15459ce00360e59642e07
-
SSDEEP
24576:9u6J33O0c+JY5UZ+XC0kGso6FauwvRTvev2mocWY:Pu0c++OCvkGs9FaukY
-
NetWire RAT payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-