General
-
Target
50a652b21941da40d9fca80d12bd35f8_JaffaCakes118
-
Size
324KB
-
Sample
240517-v3cw4aae85
-
MD5
50a652b21941da40d9fca80d12bd35f8
-
SHA1
b7cf2f941503dcb9167e9fcaf8a159c741161fbd
-
SHA256
666a8dbc172bcf7cd698bf95e5b58de17535121fed7de5ce1349db4446a1fa5c
-
SHA512
6ba80cc4748213b4c83e17c852414bc7815fa7345ff70caf44744d1a94eccec2ca40c37b464cebd4c946d41ecaa6c2e475fc0d00adda15b18f223be8053ad79e
-
SSDEEP
6144:8Pb+JB1nuNURlRBOipj5W01NSVsJipfBDNcjat9w44ml5:pYMjF+V7hBDm+934Y
Static task
static1
Behavioral task
behavioral1
Sample
50a652b21941da40d9fca80d12bd35f8_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
netwire
88.150.189.103:3360
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
50a652b21941da40d9fca80d12bd35f8_JaffaCakes118
-
Size
324KB
-
MD5
50a652b21941da40d9fca80d12bd35f8
-
SHA1
b7cf2f941503dcb9167e9fcaf8a159c741161fbd
-
SHA256
666a8dbc172bcf7cd698bf95e5b58de17535121fed7de5ce1349db4446a1fa5c
-
SHA512
6ba80cc4748213b4c83e17c852414bc7815fa7345ff70caf44744d1a94eccec2ca40c37b464cebd4c946d41ecaa6c2e475fc0d00adda15b18f223be8053ad79e
-
SSDEEP
6144:8Pb+JB1nuNURlRBOipj5W01NSVsJipfBDNcjat9w44ml5:pYMjF+V7hBDm+934Y
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-