General
-
Target
29a6a4be84ae6fb75f31eeaa4f811cbc_JaffaCakes118
-
Size
327KB
-
Sample
240509-m5ybtagh54
-
MD5
29a6a4be84ae6fb75f31eeaa4f811cbc
-
SHA1
101235610be4b95fe5e7cb1111ca4a4315f691be
-
SHA256
155b0958894658f7554520e8827f2aae4fc8e0ab3c117573e18de953a6601ad7
-
SHA512
75473d32c263f2c9c2acfddad140910aeac655a363a0e5d84d0437d2fa2de1f62225a36a04337c193a387540357472088798836220a42fb34c2cfe46b625b337
-
SSDEEP
3072:t4LwTe3Nyi/MoQ8DIBcvZAGgzx/J/Zshy7FRoyyP9M8VQcrXGBoHHFRZ:t4LwTedl0ot4cG5JJ/ZkvM8OSFR
Static task
static1
Behavioral task
behavioral1
Sample
29a6a4be84ae6fb75f31eeaa4f811cbc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29a6a4be84ae6fb75f31eeaa4f811cbc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
netwire
mlhdns.phatbois.me:4772
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
29a6a4be84ae6fb75f31eeaa4f811cbc_JaffaCakes118
-
Size
327KB
-
MD5
29a6a4be84ae6fb75f31eeaa4f811cbc
-
SHA1
101235610be4b95fe5e7cb1111ca4a4315f691be
-
SHA256
155b0958894658f7554520e8827f2aae4fc8e0ab3c117573e18de953a6601ad7
-
SHA512
75473d32c263f2c9c2acfddad140910aeac655a363a0e5d84d0437d2fa2de1f62225a36a04337c193a387540357472088798836220a42fb34c2cfe46b625b337
-
SSDEEP
3072:t4LwTe3Nyi/MoQ8DIBcvZAGgzx/J/Zshy7FRoyyP9M8VQcrXGBoHHFRZ:t4LwTedl0ot4cG5JJ/ZkvM8OSFR
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-