General
-
Target
70d292094bf2dfb83fbe9b2294de3d3b_JaffaCakes118
-
Size
764KB
-
Sample
240525-erzzgsec35
-
MD5
70d292094bf2dfb83fbe9b2294de3d3b
-
SHA1
1da58ca1d1800afcbbdc0abf12d3a85fd59b8b1e
-
SHA256
9e6ab216fa2eb58d09b619aa466a0e185f5aed12794f5166dcc15644ac5f9cd8
-
SHA512
f260c7548bbae3eae2e3f029c2e65f39d60eee1561ec0848c234d6ede32c2b0ab0d4087985613ef16e3fb3fd1eeac3887cb08c28a6c2e6aefbdd47a6f1d69d2a
-
SSDEEP
12288:OK2mhAMJ/cPlkQDSrXnIeJuD6eLHjW3OPdGaOD/qcfznY6ka/3IF2wOO32AsS2e9:f2O/GlkQDSrTJBYHfd2/ZkafpcTsS2ap
Static task
static1
Behavioral task
behavioral1
Sample
70d292094bf2dfb83fbe9b2294de3d3b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
70d292094bf2dfb83fbe9b2294de3d3b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
netwire
5.133.11.63:4068
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Pedro1234
-
registry_autorun
false
-
use_mutex
false
Targets
-
-
Target
70d292094bf2dfb83fbe9b2294de3d3b_JaffaCakes118
-
Size
764KB
-
MD5
70d292094bf2dfb83fbe9b2294de3d3b
-
SHA1
1da58ca1d1800afcbbdc0abf12d3a85fd59b8b1e
-
SHA256
9e6ab216fa2eb58d09b619aa466a0e185f5aed12794f5166dcc15644ac5f9cd8
-
SHA512
f260c7548bbae3eae2e3f029c2e65f39d60eee1561ec0848c234d6ede32c2b0ab0d4087985613ef16e3fb3fd1eeac3887cb08c28a6c2e6aefbdd47a6f1d69d2a
-
SSDEEP
12288:OK2mhAMJ/cPlkQDSrXnIeJuD6eLHjW3OPdGaOD/qcfznY6ka/3IF2wOO32AsS2e9:f2O/GlkQDSrTJBYHfd2/ZkafpcTsS2ap
Score10/10-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-