General
-
Target
63316b248c6223c9af780f6702462e72_JaffaCakes118
-
Size
819KB
-
Sample
240521-n1zjracf6y
-
MD5
63316b248c6223c9af780f6702462e72
-
SHA1
61bbdbe9cc7e769bc6f9487f8e6ce43bb3235191
-
SHA256
5c93003e656dfd4f287872c450376c508f3cf514c47df13679e948d0ae9a7a1e
-
SHA512
bac1fb7c51a388e28946fef08805cf212393a7297b7808cb72e57eb1be6f3d18eb6825f177e149c2508116c9822935401b1e30227e25678baad75141f604bfd2
-
SSDEEP
24576:gkdLPuTjvHQ5wtGkmvr2+7k/qKWdAMWdg/9B7W:FM7w5wtGkVWkTOAlGn7W
Behavioral task
behavioral1
Sample
63316b248c6223c9af780f6702462e72_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
lokibot
http://fashionstune.com/bd/lok/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
netwire
91.192.100.49:3917
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
63316b248c6223c9af780f6702462e72_JaffaCakes118
-
Size
819KB
-
MD5
63316b248c6223c9af780f6702462e72
-
SHA1
61bbdbe9cc7e769bc6f9487f8e6ce43bb3235191
-
SHA256
5c93003e656dfd4f287872c450376c508f3cf514c47df13679e948d0ae9a7a1e
-
SHA512
bac1fb7c51a388e28946fef08805cf212393a7297b7808cb72e57eb1be6f3d18eb6825f177e149c2508116c9822935401b1e30227e25678baad75141f604bfd2
-
SSDEEP
24576:gkdLPuTjvHQ5wtGkmvr2+7k/qKWdAMWdg/9B7W:FM7w5wtGkVWkTOAlGn7W
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-