General
-
Target
1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118
-
Size
393KB
-
Sample
240505-zlrq5sde51
-
MD5
1936832fc3fa98eb6e6ab8b2bcf06035
-
SHA1
cc25ac3fb94fe6409fa8a661f1ad9aa11bdd8306
-
SHA256
3b64f3a5655db4fd8e54db5398e5527e77f9731b80ff22378caae7b2d631437d
-
SHA512
fabeaca361f7a4bdcca12a767113e84e2248892cef7a6237c03674fb05f3eb1b93ac5a78536766ca3ccb5bf5cdd2091e713e9403189aed223b79e51650a04ca5
-
SSDEEP
6144:mCbQchTwXNYeiLX4AmFrcPKSdj/4KngWIq6jRkbkN:l7hTwXifX4TFgSSKKngWIjok
Static task
static1
Behavioral task
behavioral1
Sample
1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
mlhdns.phatbois.me:4772
mlhdns.pandabearsunited.xyz:4772
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
1936832fc3fa98eb6e6ab8b2bcf06035_JaffaCakes118
-
Size
393KB
-
MD5
1936832fc3fa98eb6e6ab8b2bcf06035
-
SHA1
cc25ac3fb94fe6409fa8a661f1ad9aa11bdd8306
-
SHA256
3b64f3a5655db4fd8e54db5398e5527e77f9731b80ff22378caae7b2d631437d
-
SHA512
fabeaca361f7a4bdcca12a767113e84e2248892cef7a6237c03674fb05f3eb1b93ac5a78536766ca3ccb5bf5cdd2091e713e9403189aed223b79e51650a04ca5
-
SSDEEP
6144:mCbQchTwXNYeiLX4AmFrcPKSdj/4KngWIq6jRkbkN:l7hTwXifX4TFgSSKKngWIjok
-
Detect ZGRat V1
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-