General
-
Target
4939e21f86162a870d5ea2edfc4e8744_JaffaCakes118
-
Size
196KB
-
Sample
240516-drta9shg71
-
MD5
4939e21f86162a870d5ea2edfc4e8744
-
SHA1
263589dc6dad97e8f2f62aa719b2749d5bbb2f19
-
SHA256
0c1a0c367da54439e8fb305f1065d57cb0a668908c171926e7c15f77cc9f60f1
-
SHA512
d1a9d5025c4c41ba5f2e94c59873c50e6690528ec891897fab2a0b34b2546c3bd736d14d34a59d67c23cb96aa78b85b34423fc5bf974e388af7f627ea96a754d
-
SSDEEP
3072:ptIqXZdnssLpsLKRS/uiutwnWjnaEo5w1rPraaG1c0AEWR1rIiV1en8MT/wvF:Myzrey68tiWGSrm+vVPvU8S/wN
Static task
static1
Behavioral task
behavioral1
Sample
4939e21f86162a870d5ea2edfc4e8744_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
netwire
fingers1.ddns.net:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
4939e21f86162a870d5ea2edfc4e8744_JaffaCakes118
-
Size
196KB
-
MD5
4939e21f86162a870d5ea2edfc4e8744
-
SHA1
263589dc6dad97e8f2f62aa719b2749d5bbb2f19
-
SHA256
0c1a0c367da54439e8fb305f1065d57cb0a668908c171926e7c15f77cc9f60f1
-
SHA512
d1a9d5025c4c41ba5f2e94c59873c50e6690528ec891897fab2a0b34b2546c3bd736d14d34a59d67c23cb96aa78b85b34423fc5bf974e388af7f627ea96a754d
-
SSDEEP
3072:ptIqXZdnssLpsLKRS/uiutwnWjnaEo5w1rPraaG1c0AEWR1rIiV1en8MT/wvF:Myzrey68tiWGSrm+vVPvU8S/wN
-
NetWire RAT payload
-
Drops startup file
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-