General
-
Target
28c7c3357fdbfef80f92ff8d0efd5988_JaffaCakes118
-
Size
1.2MB
-
Sample
240509-hkjkpshf99
-
MD5
28c7c3357fdbfef80f92ff8d0efd5988
-
SHA1
be02669f64bb74b8de0492ef306ad395439c5037
-
SHA256
91736aebc292f7aa6a99944d7a217b86616f5dbd86d7505a9dc0e567c508bf5d
-
SHA512
57b65b4af21cbcc72e3c8c0b18ed7d2531bf5c31e02642bd297f5e456befd87f10b670cbfa8ba2ea1f8cea2902eb4e141328284d3b763d07ca77edf42c9df5ad
-
SSDEEP
24576:SvpG2Cojx0pB9w/4Bf1ZXgcPDZuRW3Ane7AxFzEhed1r9:r2bx60/4B3NDcAwe7y+heR
Static task
static1
Behavioral task
behavioral1
Sample
28c7c3357fdbfef80f92ff8d0efd5988_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
28c7c3357fdbfef80f92ff8d0efd5988_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
netwire
pd1n.ddns.net:1968
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
pd1n-noip
-
lock_executable
false
-
offline_keylogger
false
-
password
Kimbolsapoq!P12
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
28c7c3357fdbfef80f92ff8d0efd5988_JaffaCakes118
-
Size
1.2MB
-
MD5
28c7c3357fdbfef80f92ff8d0efd5988
-
SHA1
be02669f64bb74b8de0492ef306ad395439c5037
-
SHA256
91736aebc292f7aa6a99944d7a217b86616f5dbd86d7505a9dc0e567c508bf5d
-
SHA512
57b65b4af21cbcc72e3c8c0b18ed7d2531bf5c31e02642bd297f5e456befd87f10b670cbfa8ba2ea1f8cea2902eb4e141328284d3b763d07ca77edf42c9df5ad
-
SSDEEP
24576:SvpG2Cojx0pB9w/4Bf1ZXgcPDZuRW3Ane7AxFzEhed1r9:r2bx60/4B3NDcAwe7y+heR
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-