General
-
Target
30ee8d64e0aa8cb11ba98364a36fe3a6_JaffaCakes118
-
Size
681KB
-
Sample
240510-zb8a5sgc7s
-
MD5
30ee8d64e0aa8cb11ba98364a36fe3a6
-
SHA1
c7e6f49d48d8ac868f98d1bff962c43df04f4fa0
-
SHA256
e37dae4e6a03f0b0a8ebb6766c1629817f9fd26d13d905cde504dbe4ed726344
-
SHA512
c9f7c658679a4de0e117ebd9ab8b3d5316fd1a519c0de72e2a4116a1372b719f74d1c5c92466254d84f03688583eac458d547e0f218597fe6c2e0db6259fb41c
-
SSDEEP
6144:C+O0DJep4FhjrdrGIUW3WXNjEGzRVKZ8bGRWXKC9wOfuNq58L+Loqwm+CasotfTL:C+xgGRcp9bnYQHDS
Static task
static1
Behavioral task
behavioral1
Sample
30ee8d64e0aa8cb11ba98364a36fe3a6_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
30ee8d64e0aa8cb11ba98364a36fe3a6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
netwire
akconsult.linkpc.net:8181
akconsult.linkpc.net:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
CONTRACT
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
OCoDgKob
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
30ee8d64e0aa8cb11ba98364a36fe3a6_JaffaCakes118
-
Size
681KB
-
MD5
30ee8d64e0aa8cb11ba98364a36fe3a6
-
SHA1
c7e6f49d48d8ac868f98d1bff962c43df04f4fa0
-
SHA256
e37dae4e6a03f0b0a8ebb6766c1629817f9fd26d13d905cde504dbe4ed726344
-
SHA512
c9f7c658679a4de0e117ebd9ab8b3d5316fd1a519c0de72e2a4116a1372b719f74d1c5c92466254d84f03688583eac458d547e0f218597fe6c2e0db6259fb41c
-
SSDEEP
6144:C+O0DJep4FhjrdrGIUW3WXNjEGzRVKZ8bGRWXKC9wOfuNq58L+Loqwm+CasotfTL:C+xgGRcp9bnYQHDS
Score10/10-
NetWire RAT payload
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-