General
-
Target
4ed9a9bb58423bb44c4e9124df9df9d5_JaffaCakes118
-
Size
1.1MB
-
Sample
240517-hf4p3seb3s
-
MD5
4ed9a9bb58423bb44c4e9124df9df9d5
-
SHA1
819e45fdeef66213817b12752172f43e3ecda7d2
-
SHA256
acaf1c903f12ba88cd89c3f3e41479ba027639bc9835b2a9a1e6c001126921cf
-
SHA512
299818d740582dae0295f4920b7dd23d74c8895598b55614fe2d4fdd9f21d3ab56711b2112fcf317495c8de3b39312ef3060c4ee6b553de93ca937bb11615f5b
-
SSDEEP
24576:t70c5yHJH+pBqeW0SAyFLmqIhtFA0G98L6ITels/k:tAc5geHqeXSAImzm0G/Aelok
Static task
static1
Behavioral task
behavioral1
Sample
4ed9a9bb58423bb44c4e9124df9df9d5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ed9a9bb58423bb44c4e9124df9df9d5_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
netwire
officedesk007.hopto.org:4040
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
pst
-
install_path
%AppData%\pst\pst.exe
-
keylogger_dir
%AppData%\pst\
-
lock_executable
true
-
mutex
vXmoHYGT
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
pst
-
use_mutex
true
Targets
-
-
Target
4ed9a9bb58423bb44c4e9124df9df9d5_JaffaCakes118
-
Size
1.1MB
-
MD5
4ed9a9bb58423bb44c4e9124df9df9d5
-
SHA1
819e45fdeef66213817b12752172f43e3ecda7d2
-
SHA256
acaf1c903f12ba88cd89c3f3e41479ba027639bc9835b2a9a1e6c001126921cf
-
SHA512
299818d740582dae0295f4920b7dd23d74c8895598b55614fe2d4fdd9f21d3ab56711b2112fcf317495c8de3b39312ef3060c4ee6b553de93ca937bb11615f5b
-
SSDEEP
24576:t70c5yHJH+pBqeW0SAyFLmqIhtFA0G98L6ITels/k:tAc5geHqeXSAImzm0G/Aelok
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-