General
-
Target
6b5a574c81822c806e598fde5aad93fc_JaffaCakes118
-
Size
283KB
-
Sample
240523-sl946afd4t
-
MD5
6b5a574c81822c806e598fde5aad93fc
-
SHA1
afbdd84b379d5c392674f2a54bedf01f6f7f9f2b
-
SHA256
fc69f372117af1a15837fd6a490ae821a91db40907f524d91d9003ea719fa8aa
-
SHA512
5ac96dc5046f8408575c6f620129d4d211be178633ba405e20a0a329780c816396bc8ec41a277c09928cb37778fbf6fcf574539d268269ac26261d7ae7ea3cff
-
SSDEEP
6144:AoMdUh1RXAi/q7KtrDTWXWQGaeyLl2HWYkgSEXMEV9p:AjwJWX55mk
Static task
static1
Behavioral task
behavioral1
Sample
6b5a574c81822c806e598fde5aad93fc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b5a574c81822c806e598fde5aad93fc_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
netwire
185.163.100.6:111
-
activex_autorun
true
-
activex_key
{446644VO-124I-732R-6QR3-BBYQ1W40UCW2}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
YSxJvAQj
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Targets
-
-
Target
6b5a574c81822c806e598fde5aad93fc_JaffaCakes118
-
Size
283KB
-
MD5
6b5a574c81822c806e598fde5aad93fc
-
SHA1
afbdd84b379d5c392674f2a54bedf01f6f7f9f2b
-
SHA256
fc69f372117af1a15837fd6a490ae821a91db40907f524d91d9003ea719fa8aa
-
SHA512
5ac96dc5046f8408575c6f620129d4d211be178633ba405e20a0a329780c816396bc8ec41a277c09928cb37778fbf6fcf574539d268269ac26261d7ae7ea3cff
-
SSDEEP
6144:AoMdUh1RXAi/q7KtrDTWXWQGaeyLl2HWYkgSEXMEV9p:AjwJWX55mk
Score10/10-
NetWire RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-