General
-
Target
41cddb92c40e1603cdd00456cf19b1b8_JaffaCakes118
-
Size
448KB
-
Sample
240514-rnsgfsaf7w
-
MD5
41cddb92c40e1603cdd00456cf19b1b8
-
SHA1
c55741e0e2068f8f2c1f920822335ecf2816a17e
-
SHA256
fdadd323f4e3b7dfa61822fb9abe621a9dc0b79f465c8b767cee4f5ecf4bb194
-
SHA512
fcb9110cc2c6e469079c400ab2f2a7cd55c92011fcdcc7a38a4fb483489a2ac642e097bf9099a94063b4ff5e7450116f2ac581292f1b81a252731d6181a902d0
-
SSDEEP
6144:wQN9opCq9B2U1NZx9WRpRnbcE96n6+mpv2muhHklc37k8ztMj/+pLp:5opCQ4YWRnYE06+0BumlmkvzCp
Static task
static1
Behavioral task
behavioral1
Sample
41cddb92c40e1603cdd00456cf19b1b8_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
41cddb92c40e1603cdd00456cf19b1b8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
netwire
top.westover.xyz:4590
-
activex_autorun
true
-
activex_key
{803GTO4N-ENS6-08FV-IL8I-U12VW8O81OU2}
-
copy_executable
false
-
delete_original
false
-
host_id
ACALYS-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
WDqjVsjL
-
offline_keylogger
true
-
password
252522
-
registry_autorun
true
-
startup_name
printer
-
use_mutex
true
Targets
-
-
Target
41cddb92c40e1603cdd00456cf19b1b8_JaffaCakes118
-
Size
448KB
-
MD5
41cddb92c40e1603cdd00456cf19b1b8
-
SHA1
c55741e0e2068f8f2c1f920822335ecf2816a17e
-
SHA256
fdadd323f4e3b7dfa61822fb9abe621a9dc0b79f465c8b767cee4f5ecf4bb194
-
SHA512
fcb9110cc2c6e469079c400ab2f2a7cd55c92011fcdcc7a38a4fb483489a2ac642e097bf9099a94063b4ff5e7450116f2ac581292f1b81a252731d6181a902d0
-
SSDEEP
6144:wQN9opCq9B2U1NZx9WRpRnbcE96n6+mpv2muhHklc37k8ztMj/+pLp:5opCQ4YWRnYE06+0BumlmkvzCp
Score10/10-
NetWire RAT payload
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-