General
-
Target
3825efd5fcbdde5bd2a250c08d335c91_JaffaCakes118
-
Size
512KB
-
Sample
240512-elfcwsag33
-
MD5
3825efd5fcbdde5bd2a250c08d335c91
-
SHA1
8337c955226c5568fb81a5cba795ddb34b86ce77
-
SHA256
782b974af31ff9999e5449f9a675ea18d97d26456a277327b1e492c539e14ece
-
SHA512
caa5274799517e73e96f1ffd089a7797f9fda4b5df34a9ba634fb13bc685ab68733c80594a01d239490d9768f4e7f9ac88f8be24dc540a0032b8657d53cc2c36
-
SSDEEP
3072:Z9VkLyI8bS7A7WGAXLKEHpImmRxOt47AEsEUgOqWr6:fWN8bS7rjXWEJImmRQ27ADE
Static task
static1
Behavioral task
behavioral1
Sample
3825efd5fcbdde5bd2a250c08d335c91_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3825efd5fcbdde5bd2a250c08d335c91_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
lokibot
http://rijadeja.online//wp-admin/lang/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
netwire
brioushde.sytes.net:1982
-
activex_autorun
true
-
activex_key
{54Q7I7SW-LW5J-T8RK-0CO4-V2U623687CI6}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
MPkcWYro
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
3825efd5fcbdde5bd2a250c08d335c91_JaffaCakes118
-
Size
512KB
-
MD5
3825efd5fcbdde5bd2a250c08d335c91
-
SHA1
8337c955226c5568fb81a5cba795ddb34b86ce77
-
SHA256
782b974af31ff9999e5449f9a675ea18d97d26456a277327b1e492c539e14ece
-
SHA512
caa5274799517e73e96f1ffd089a7797f9fda4b5df34a9ba634fb13bc685ab68733c80594a01d239490d9768f4e7f9ac88f8be24dc540a0032b8657d53cc2c36
-
SSDEEP
3072:Z9VkLyI8bS7A7WGAXLKEHpImmRxOt47AEsEUgOqWr6:fWN8bS7rjXWEJImmRQ27ADE
-
NetWire RAT payload
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-