General
-
Target
3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118
-
Size
1.1MB
-
Sample
240513-keqsyaed5s
-
MD5
3e9467442e5d328b1e6e4f23672e5f5b
-
SHA1
c38c50d58063658b3d428e9e8dd9c501416d98cf
-
SHA256
918e7e4a7aa12b74a559bff1813122430a87e3d132ae8c394bf919928d529c2c
-
SHA512
29d27bff96569b42a8cbfb2bf9e50ed14fc0983bc58c684e0922e81fd940e2e0cfeabdaaa4fa14ac7abdb1241047c6afda0da8e4b688b2e56ddf2f3d1efa7d97
-
SSDEEP
24576:hu6J33O0c+JY5UZ+XC0kGso6FaQTwzhnpAWY:zu0c++OCvkGs9FahPY
Static task
static1
Behavioral task
behavioral1
Sample
3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
77.48.28.195:1969
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
n2
-
lock_executable
false
-
mutex
JquNADho
-
offline_keylogger
false
-
password
Kimbolsapoq!P13
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
3e9467442e5d328b1e6e4f23672e5f5b_JaffaCakes118
-
Size
1.1MB
-
MD5
3e9467442e5d328b1e6e4f23672e5f5b
-
SHA1
c38c50d58063658b3d428e9e8dd9c501416d98cf
-
SHA256
918e7e4a7aa12b74a559bff1813122430a87e3d132ae8c394bf919928d529c2c
-
SHA512
29d27bff96569b42a8cbfb2bf9e50ed14fc0983bc58c684e0922e81fd940e2e0cfeabdaaa4fa14ac7abdb1241047c6afda0da8e4b688b2e56ddf2f3d1efa7d97
-
SSDEEP
24576:hu6J33O0c+JY5UZ+XC0kGso6FaQTwzhnpAWY:zu0c++OCvkGs9FahPY
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-