General
-
Target
1c19ec8eb4b0cd8e3531d4527c36f020_JaffaCakes118
-
Size
782KB
-
Sample
240506-mqbt9scd85
-
MD5
1c19ec8eb4b0cd8e3531d4527c36f020
-
SHA1
786e999d507af2aeb6e46b6ea170da27c82135c3
-
SHA256
24ec59f7e3c2a9dec81ea257e324c80fdb6cae2927f012527ccad3c7ebd61652
-
SHA512
25885de600bd9ef48c56b5192f1813d2593ef889ad17cba367ca769320b02db830ba8cfb90c516d529e3eb2e2312bad2800e4f2d58d24645c6cc290ab4dc999e
-
SSDEEP
12288:OK2mhAMJ/cPlG1Bm7xIFzU/rMpupCBzlrreJA+LmbdjY07+bn1hf3rU6OGPATC+b:f2O/GlGe7Vz/IzwmxhKbH3rUO46GJzx
Static task
static1
Behavioral task
behavioral1
Sample
1c19ec8eb4b0cd8e3531d4527c36f020_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1c19ec8eb4b0cd8e3531d4527c36f020_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
netwire
5.133.11.63:4068
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Pedro1234
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
1c19ec8eb4b0cd8e3531d4527c36f020_JaffaCakes118
-
Size
782KB
-
MD5
1c19ec8eb4b0cd8e3531d4527c36f020
-
SHA1
786e999d507af2aeb6e46b6ea170da27c82135c3
-
SHA256
24ec59f7e3c2a9dec81ea257e324c80fdb6cae2927f012527ccad3c7ebd61652
-
SHA512
25885de600bd9ef48c56b5192f1813d2593ef889ad17cba367ca769320b02db830ba8cfb90c516d529e3eb2e2312bad2800e4f2d58d24645c6cc290ab4dc999e
-
SSDEEP
12288:OK2mhAMJ/cPlG1Bm7xIFzU/rMpupCBzlrreJA+LmbdjY07+bn1hf3rU6OGPATC+b:f2O/GlGe7Vz/IzwmxhKbH3rUO46GJzx
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-