General
-
Target
2397b6a1c453e3dfd43a8769c9a075ca_JaffaCakes118
-
Size
999KB
-
Sample
240508-g51t2sfa6z
-
MD5
2397b6a1c453e3dfd43a8769c9a075ca
-
SHA1
9a921fbffde9b7d9c2b4dabb8d72f43c5cac516d
-
SHA256
dc0e2ba020204310d3caa9e7ecf71294c5338a0af2262dce14b413aeed026db5
-
SHA512
a86f4588db1a6a466156e00cde401051158143289d5e8e7ac1f7f373434d56800f3429dcba3698c0b1d2e182552f4822bebe45c03a95b5c965bfd8cdb48a11fe
-
SSDEEP
24576:bNA3R5drXTLPdNvhRpzmoJ4vkTdy89IoGqZuBUKwT+Zgbri:G5PlhFaoJ4vkTdy8GbqZuGKwT+aPi
Static task
static1
Behavioral task
behavioral1
Sample
2397b6a1c453e3dfd43a8769c9a075ca_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2397b6a1c453e3dfd43a8769c9a075ca_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
netwire
5.133.15.5:3389
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
MayPro123
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
2397b6a1c453e3dfd43a8769c9a075ca_JaffaCakes118
-
Size
999KB
-
MD5
2397b6a1c453e3dfd43a8769c9a075ca
-
SHA1
9a921fbffde9b7d9c2b4dabb8d72f43c5cac516d
-
SHA256
dc0e2ba020204310d3caa9e7ecf71294c5338a0af2262dce14b413aeed026db5
-
SHA512
a86f4588db1a6a466156e00cde401051158143289d5e8e7ac1f7f373434d56800f3429dcba3698c0b1d2e182552f4822bebe45c03a95b5c965bfd8cdb48a11fe
-
SSDEEP
24576:bNA3R5drXTLPdNvhRpzmoJ4vkTdy89IoGqZuBUKwT+Zgbri:G5PlhFaoJ4vkTdy8GbqZuGKwT+aPi
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-